VYPR

rpm package

suse/glibc&distro=SUSE Linux Enterprise Server 12 SP2-BCL

pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL

Vulnerabilities (20)

  • CVE-2021-3999Aug 24, 2022
    affected < 2.22-119.1fixed 2.22-119.1

    A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to pote

  • CVE-2022-23219Jan 14, 2022
    affected < 2.22-119.1fixed 2.22-119.1

    The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if

  • CVE-2022-23218Jan 14, 2022
    affected < 2.22-119.1fixed 2.22-119.1

    The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if

  • CVE-2021-35942Jul 22, 2021
    affected < 2.22-116.1fixed 2.22-116.1

    The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because

  • CVE-2021-33574May 25, 2021
    affected < 2.22-116.1fixed 2.22-116.1

    The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (applicat

  • CVE-2020-27618Feb 26, 2021
    affected < 2.22-126.1fixed 2.22-126.1

    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications,

  • CVE-2021-3326Jan 27, 2021
    affected < 2.22-126.1fixed 2.22-126.1

    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

  • CVE-2019-25013Jan 4, 2021
    affected < 2.22-126.1fixed 2.22-126.1

    The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read.

  • CVE-2020-29573Dec 5, 2020
    affected < 2.22-126.1fixed 2.22-126.1

    sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\

  • CVE-2020-29562Dec 4, 2020
    affected < 2.22-126.1fixed 2.22-126.1

    The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

  • CVE-2020-1752Apr 30, 2020
    affected < 2.22-123.1fixed 2.22-123.1

    A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre

  • CVE-2020-10029Mar 4, 2020
    affected < 2.22-113.4fixed 2.22-113.4

    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat

  • CVE-2019-9169Feb 26, 2019
    affected < 2.22-62.22.5fixed 2.22-62.22.5

    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

  • CVE-2009-5155Feb 26, 2019
    affected < 2.22-62.22.5fixed 2.22-62.22.5

    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

  • CVE-2016-10739Jan 21, 2019
    affected < 2.22-133.1fixed 2.22-133.1

    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string

  • CVE-2018-11237May 18, 2018
    affected < 2.22-62.13.2fixed 2.22-62.13.2

    An AVX-512-optimized implementation of the mempcpy function in the GNU C Library (aka glibc or libc6) 2.27 and earlier may write data beyond the target buffer, leading to a buffer overflow in __mempcpy_avx512_no_vzeroupper.

  • CVE-2018-11236May 18, 2018
    affected < 2.22-62.13.2fixed 2.22-62.13.2

    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitra

  • CVE-2017-18269May 18, 2018
    affected < 2.22-62.13.2fixed 2.22-62.13.2

    An SSE2-optimized memmove implementation for i386 in sysdeps/i386/i686/multiarch/memcpy-sse2-unaligned.S in the GNU C Library (aka glibc or libc6) 2.21 through 2.27 does not correctly perform the overlapping memory check if the source memory range spans the middle of the address

  • CVE-2015-5180HigJun 27, 2017
    affected < 2.22-126.1fixed 2.22-126.1

    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).

  • CVE-2016-10228MedMar 2, 2017
    affected < 2.22-126.1fixed 2.22-126.1

    The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a d