- glibc-2.28-127.el8 ()
- 2.28-251.el8_10.16
- 2025-04-21 14:00:10
- CVE CVE-2019-9169, CVSSv2 Score: 6.5
- Description:
Fix buffer overread in regexec.c
- Patch: glibc/2.28/glibc-rh1685400.patch
- CVE CVE-2019-25013, CVSSv2 Score: 4.8
- Description:
Fix buffer overrun in EUC-KR conversion module
- Patch: glibc/2.28/glibc-rh1912544.patch
- CVE CVE-2021-3326, CVSSv2 Score: 7.5
- Description:
Fix assertion failure in ISO-2022-JP-3 module
- Patch: glibc/2.28/glibc-rh1924919.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-1.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-2.patch
- CVE CVE-2020-27618, CVSSv2 Score: 5.5
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-3.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-4.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-5.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-adapt.patch
- CVE CVE-2021-27645, CVSSv2 Score: 2.5
- Description:
https://access.redhat.com/security/cve/CVE-2021-27645
- Patch: glibc/2.28/glibc-rh1927877.patch
- CVE CVE-2021-35942, CVSSv2 Score: 9.1
- Description:
https://access.redhat.com/security/cve/CVE-2021-35942
- Patch: glibc/2.28/glibc-rh1979127.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-1.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-2.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-3.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-4.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh1966472-adapt.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh1966472-adapt-test.patch
- CVE CVE-2021-33574, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/git-CVE-2021-33574-mq_notify-use-after-free-adapted.patch
- CVE CVE-2021-3999, CVSSv2 Score: 7.4
- Description:
Off-by-one buffer overflow/underflow in getcwd()
- Patch: glibc/2.28/glibc-rh2032280-4.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh2045062-1.patch
- CVE CVE-2022-23219, CVSSv2 Score: 7.0
- Description:
Buffer overflow in sunrpc clnt_create for "unix"
- Patch: glibc/2.28/glibc-rh2045062-2.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh2045062-3.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
Buffer overflow in sunrpc svcunix_create
- Patch: glibc/2.28/glibc-rh2045062-4.patch
- CVE CVE-2023-4813, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
- Patch: glibc/2.28/glibc-RHEL-2434.patch
- CVE N/A, CVSSv2 Score:
- Description:
Necessary patch for glibc-RHEL-2422.patch.
- Patch: glibc/2.28/glibc-rh2063712.patch
- CVE CVE-2023-4806, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
- Patch: glibc/2.28/glibc-RHEL-2422.patch
- CVE CVE-2024-2961, CVSSv2 Score: 8.8
- Description:
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
- Patch: glibc/2.28/CVE-2024-2961.patch
- CVE CVE-2024-33599, CVSSv2 Score: 7.6
- Description:
nscd: Stack-based buffer overflow in netgroup cache
- Patch: glibc/2.28/CVE-2024-33599_RHEL-34264.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response
- Patch: glibc/2.28/CVE-2024-33600_RHEL-34267-1.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response
- Patch: glibc/2.28/CVE-2024-33600_RHEL-34267-2.patch
- CVE CVE-2024-33601 CVE-2024-33602, CVSSv2 Score: 4.0
- Description:
nscd: netgroup cache assumes NSS callback uses in-buffer strings
- Patch: glibc/2.28/CVE-2024-33601_33602_RHEL-34273.patch
- CVE CVE-2025-0395, CVSSv2 Score: 5.5
- Description:
A flaw was found in the GNU C Library (glibc). A buffer overflow condition via the assert() function may be triggered due to glibc not allocating enough space for the assertion failure message string and size information. In certain conditions, a local attacker can exploit this, potentially leading to an application crash or other undefined behavior.
- Patch: glibc/2.28/glibc-RHEL-83306-1.patch