rpm package
suse/glibc&distro=SUSE Linux Enterprise Module for Development Tools 15 SP1
pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Development%20Tools%2015%20SP1
Vulnerabilities (5)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-1752 | — | < 2.26-13.45.1 | 2.26-13.45.1 | Apr 30, 2020 | A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre | ||
| CVE-2020-10029 | — | < 2.26-13.39.1 | 2.26-13.39.1 | Mar 4, 2020 | The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat | ||
| CVE-2019-19126 | — | < 2.26-13.36.1 | 2.26-13.36.1 | Nov 19, 2019 | On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries a | ||
| CVE-2019-9169 | — | < 2.26-13.24.1 | 2.26-13.24.1 | Feb 26, 2019 | In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match. | ||
| CVE-2009-5155 | — | < 2.26-13.24.1 | 2.26-13.24.1 | Feb 26, 2019 | In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match. |
- CVE-2020-1752Apr 30, 2020affected < 2.26-13.45.1fixed 2.26-13.45.1
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre
- CVE-2020-10029Mar 4, 2020affected < 2.26-13.39.1fixed 2.26-13.39.1
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat
- CVE-2019-19126Nov 19, 2019affected < 2.26-13.36.1fixed 2.26-13.36.1
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries a
- CVE-2019-9169Feb 26, 2019affected < 2.26-13.24.1fixed 2.26-13.24.1
In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.
- CVE-2009-5155Feb 26, 2019affected < 2.26-13.24.1fixed 2.26-13.24.1
In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.