VYPR

rpm package

suse/glibc&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP4

pkg:rpm/suse/glibc&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4

Vulnerabilities (15)

  • CVE-2021-3999Aug 24, 2022
    affected < 2.22-114.19.1fixed 2.22-114.19.1

    A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to pote

  • CVE-2022-23219Jan 14, 2022
    affected < 2.22-114.19.1fixed 2.22-114.19.1

    The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if

  • CVE-2022-23218Jan 14, 2022
    affected < 2.22-114.19.1fixed 2.22-114.19.1

    The deprecated compatibility function svcunix_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its path argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if

  • CVE-2021-33574May 25, 2021
    affected < 2.22-114.15.1fixed 2.22-114.15.1

    The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (applicat

  • CVE-2020-27618Feb 26, 2021
    affected < 2.22-114.8.3fixed 2.22-114.8.3

    The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications,

  • CVE-2020-29573Dec 5, 2020
    affected < 2.22-114.8.3fixed 2.22-114.8.3

    sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\

  • CVE-2020-29562Dec 4, 2020
    affected < 2.22-114.8.3fixed 2.22-114.8.3

    The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.

  • CVE-2020-1752Apr 30, 2020
    affected < 2.22-100.21.5fixed 2.22-100.21.5

    A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by cre

  • CVE-2020-1751Apr 17, 2020
    affected < 2.22-100.21.5fixed 2.22-100.21.5

    An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code executi

  • CVE-2020-10029Mar 4, 2020
    affected < 2.22-100.21.5fixed 2.22-100.21.5

    The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is relat

  • CVE-2019-9169Feb 26, 2019
    affected < 2.22-100.8.1fixed 2.22-100.8.1

    In the GNU C Library (aka glibc or libc6) through 2.29, proceed_next_node in posix/regexec.c has a heap-based buffer over-read via an attempted case-insensitive regular-expression match.

  • CVE-2009-5155Feb 26, 2019
    affected < 2.22-100.8.1fixed 2.22-100.8.1

    In the GNU C Library (aka glibc or libc6) before 2.28, parse_reg_exp in posix/regcomp.c misparses alternatives, which allows attackers to cause a denial of service (assertion failure and application exit) or trigger an incorrect result by attempting a regular-expression match.

  • CVE-2016-10739Jan 21, 2019
    affected < 2.22-100.8.1fixed 2.22-100.8.1

    In the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string

  • CVE-2015-5180HigJun 27, 2017
    affected < 2.22-100.15.4fixed 2.22-100.15.4

    res_query in libresolv in glibc before 2.25 allows remote attackers to cause a denial of service (NULL pointer dereference and process crash).

  • CVE-2015-8985MedMar 20, 2017
    affected < 2.22-114.22.1fixed 2.22-114.22.1

    The pop_fail_stack function in the GNU C Library (aka glibc or libc6) allows context-dependent attackers to cause a denial of service (assertion failure and application crash) via vectors related to extended regular expression processing.