VYPR

rpm package

opensuse/glibc&distro=openSUSE Tumbleweed

pkg:rpm/opensuse/glibc&distro=openSUSE%20Tumbleweed

Vulnerabilities (95)

  • CVE-2014-7817Nov 24, 2014
    affected < 2.24-2.3fixed 2.24-2.3

    The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

  • CVE-2014-4043Oct 6, 2014
    affected < 2.24-2.3fixed 2.24-2.3

    The posix_spawn_file_actions_addopen function in glibc before 2.20 does not copy its path argument in accordance with the POSIX specification, which allows context-dependent attackers to trigger use-after-free vulnerabilities.

  • CVE-2014-5119Aug 29, 2014
    affected < 2.24-2.3fixed 2.24-2.3

    Off-by-one error in the __gconv_translit_find function in gconv_trans.c in GNU C Library (aka glibc) allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via vectors related to the CHARSET environment variable and gconv transliteration

  • CVE-2014-0475Jul 29, 2014
    affected < 2.24-2.3fixed 2.24-2.3

    Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment

  • CVE-2012-3406Feb 10, 2014
    affected < 2.24-2.3fixed 2.24-2.3

    The vfprintf function in stdio-common/vfprintf.c in GNU C Library (aka glibc) 2.5, 2.12, and probably other versions does not "properly restrict the use of" the alloca function when allocating the SPECS array, which allows context-dependent attackers to bypass the FORTIFY_SOURCE

  • CVE-2013-4458Dec 12, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6

  • CVE-2013-4332Oct 9, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Multiple integer overflows in malloc/malloc.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allow context-dependent attackers to cause a denial of service (heap corruption) via a large value to the (1) pvalloc, (2) valloc, (3) posix_memalign, (4) memalign, or (5) ali

  • CVE-2013-4237Oct 9, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    sysdeps/posix/readdir_r.c in the GNU C Library (aka glibc or libc6) 2.18 and earlier allows context-dependent attackers to cause a denial of service (out-of-bounds write and crash) or possibly execute arbitrary code via a crafted (1) NTFS or (2) CIFS image.

  • CVE-2013-2207Oct 9, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.

  • CVE-2012-4412Oct 9, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Integer overflow in string/strcoll_l.c in the GNU C Library (aka glibc or libc6) 2.17 and earlier allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string, which triggers a heap-based buffer overflow.

  • CVE-2009-5029May 2, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Integer overflow in the __tzfile_read function in glibc before 2.15 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted timezone (TZ) file, as demonstrated using vsftpd.

  • CVE-2013-1914Apr 29, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain c

  • CVE-2013-0242Feb 8, 2013
    affected < 2.24-2.3fixed 2.24-2.3

    Buffer overflow in the extend_buffers function in the regular expression matcher (posix/regexec.c) in glibc, possibly 2.17 and earlier, allows context-dependent attackers to cause a denial of service (memory corruption and crash) via crafted multibyte characters.

  • CVE-2009-5064Mar 30, 2011
    affected < 2.34-1.2fixed 2.34-1.2

    ldd in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows local users to gain privileges via a Trojan horse executable file linked with a modified loader that omits certain LD_TRACE_LOADED_OBJECTS checks. NOTE: the GNU C Library vendor states "This is just nonsense.

  • CVE-2010-3192Oct 14, 2010
    affected < 2.34-1.2fixed 2.34-1.2

    Certain run-time memory protection mechanisms in the GNU C Library (aka glibc or libc6) print argv[0] and backtrace information, which might allow context-dependent attackers to obtain sensitive information from process memory by executing an incorrect program, as demonstrated by

Page 5 of 5