VYPR

rpm package

suse/glibc&distro=SUSE Linux Enterprise Server 12-LTSS

pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Vulnerabilities (8)

  • CVE-2018-11236May 18, 2018
    affected < 2.19-22.27.958fixed 2.19-22.27.958

    stdlib/canonicalize.c in the GNU C Library (aka glibc or libc6) 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitra

  • CVE-2018-1000001Jan 31, 2018
    affected < 2.19-22.24.5fixed 2.19-22.24.5

    In glibc 2.26 and earlier there is confusion in the usage of getcwd() by realpath() which can be used to write before the destination buffer leading to a buffer underflow and potential code execution.

  • CVE-2017-15804CriOct 22, 2017
    affected < 2.19-22.27.958fixed 2.19-22.27.958

    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27 contains a buffer overflow during unescaping of user names with the ~ operator.

  • CVE-2017-15671MedOct 20, 2017
    affected < 2.19-22.27.958fixed 2.19-22.27.958

    The glob function in glob.c in the GNU C Library (aka glibc or libc6) before 2.27, when invoked with GLOB_TILDE, could skip freeing allocated memory when processing the ~ operator with a long user name, potentially leading to a denial of service (memory leak).

  • CVE-2017-15670CriOct 20, 2017
    affected < 2.19-22.27.958fixed 2.19-22.27.958

    The GNU C Library (aka glibc or libc6) before 2.27 contains an off-by-one error leading to a heap-based buffer overflow in the glob function in glob.c, related to the processing of home directories using the ~ operator followed by a long string.

  • CVE-2017-12132MedAug 1, 2017
    affected < 2.19-22.27.958fixed 2.19-22.27.958

    The DNS stub resolver in the GNU C Library (aka glibc or libc6) before version 2.26, when EDNS support is enabled, will solicit large UDP responses from name servers, potentially simplifying off-path DNS spoofing attacks due to IP fragmentation.

  • CVE-2017-1000366HigJun 19, 2017
    affected < 2.19-22.21.1fixed 2.19-22.21.1

    glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulatio

  • CVE-2014-9984CriJun 12, 2017
    affected < 2.19-22.24.5fixed 2.19-22.24.5

    nscd in the GNU C Library (aka glibc or libc6) before version 2.20 does not correctly compute the size of an internal buffer when processing netgroup requests, possibly leading to an nscd daemon crash or code execution as the user running nscd.