rpm package
opensuse/glibc&distro=openSUSE Leap 15.1
pkg:rpm/opensuse/glibc&distro=openSUSE%20Leap%2015.1
Vulnerabilities (2)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-1752 | — | < 2.26-lp151.19.11.1 | 2.26-lp151.19.11.1 | Apr 30, 2020 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre | ||
| CVE-2020-10029 | — | < 2.26-lp151.19.3.1 | 2.26-lp151.19.3.1 | Mar 4, 2020 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat |
- CVE-2020-1752Apr 30, 2020affected < 2.26-lp151.19.11.1fixed 2.26-lp151.19.11.1
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre
- CVE-2020-10029Mar 4, 2020affected < 2.26-lp151.19.3.1fixed 2.26-lp151.19.3.1
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat