- glibc-2.28-72.0.1.el8 ()
- 2.28-251.0.2.el8_10.2
- 2024-10-15 18:00:08
- CVE CVE-2020-10029, CVSSv2 Score: 5.7
- Description:
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.28/glibc-rh1811796-1.patch
- CVE CVE-2020-10029, CVSSv2 Score: 5.7
- Description:
A flaw was found in glibc in versions prior to 2.32. Pseudo-zero values are not validated causing a stack corruption due to a stack-based overflow. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.28/glibc-rh1811796-2.patch
- CVE CVE-2020-1752, CVSSv2 Score: 7.0
- Description:
A use-after-free vulnerability was found in glibc in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution
- Patch: glibc/2.28/glibc-rh1813398.patch
- CVE CVE-2020-1751, CVSSv2 Score: 7.0
- Description:
An out-of-bounds write vulnerability was found in glibc when handling signal trampolines on PowerPC. The backtrace function did not properly check the array bounds when storing the frame address resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
- Patch: glibc/2.28/glibc-rh1813399.patch
- CVE CVE-2019-9169, CVSSv2 Score: 6.5
- Description:
Fix buffer overread in regexec.c
- Patch: glibc/2.28/glibc-rh1685400.patch
- CVE CVE-2019-25013, CVSSv2 Score: 4.8
- Description:
Fix buffer overrun in EUC-KR conversion module
- Patch: glibc/2.28/glibc-rh1912544.patch
- CVE CVE-2021-3326, CVSSv2 Score: 7.5
- Description:
Fix assertion failure in ISO-2022-JP-3 module
- Patch: glibc/2.28/glibc-rh1924919.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-1.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-2.patch
- CVE CVE-2020-27618, CVSSv2 Score: 5.5
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-3.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-4.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-5.patch
- CVE CVE-2016-10228, CVSSv2 Score: 3.3
- Description:
Fix infinite loops in iconv
- Patch: glibc/2.28/glibc-rh1704868-adapt.patch
- CVE CVE-2019-19126, CVSSv2 Score: 2.9
- Description:
Check __libc_enable_secure before honoring LD_PREFER_MAP_32BIT_EXEC
- Patch: glibc/2.28/glibc-rh1774021.patch
- CVE CVE-2021-27645, CVSSv2 Score: 2.5
- Description:
https://access.redhat.com/security/cve/CVE-2021-27645
- Patch: glibc/2.28/glibc-rh1927877.patch
- CVE CVE-2021-35942, CVSSv2 Score: 9.1
- Description:
https://access.redhat.com/security/cve/CVE-2021-35942
- Patch: glibc/2.28/glibc-rh1979127.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-1.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-2.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-3.patch
- CVE CVE-2021-33574, CVSSv2 Score: 5.9
- Description:
https://access.redhat.com/security/cve/CVE-2021-33574
- Patch: glibc/2.28/glibc-rh1966472-4.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh1966472-adapt.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh1966472-adapt-test.patch
- CVE CVE-2021-33574, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/git-CVE-2021-33574-mq_notify-use-after-free-adapted.patch
- CVE CVE-2021-3999, CVSSv2 Score: 7.4
- Description:
Off-by-one buffer overflow/underflow in getcwd()
- Patch: glibc/2.28/glibc-rh2032280-4.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh2045062-1.patch
- CVE CVE-2022-23219, CVSSv2 Score: 7.0
- Description:
Buffer overflow in sunrpc clnt_create for "unix"
- Patch: glibc/2.28/glibc-rh2045062-2.patch
- CVE N/A, CVSSv2 Score:
- Description:
- Patch: glibc/2.28/glibc-rh2045062-3.patch
- CVE CVE-2022-23218, CVSSv2 Score: 7.0
- Description:
Buffer overflow in sunrpc svcunix_create
- Patch: glibc/2.28/glibc-rh2045062-4.patch
- CVE N/A, CVSSv2 Score:
- Description:
Necessary patch for glibc-RHEL-2434.patch
- Patch: glibc/2.28/glibc-rh1747502.patch
- CVE CVE-2023-4813, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
- Patch: glibc/2.28/glibc-RHEL-2434.patch
- CVE N/A, CVSSv2 Score:
- Description:
Necessary patch for glibc-RHEL-2422.patch.
- Patch: glibc/2.28/glibc-rh2063712.patch
- CVE CVE-2023-4806, CVSSv2 Score: 5.9
- Description:
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
- Patch: glibc/2.28/glibc-RHEL-2422.patch
- CVE CVE-2024-2961, CVSSv2 Score: 8.8
- Description:
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
- Patch: glibc/2.28/CVE-2024-2961.patch
- CVE CVE-2024-33599, CVSSv2 Score: 7.6
- Description:
nscd: Stack-based buffer overflow in netgroup cache
- Patch: glibc/2.28/CVE-2024-33599_RHEL-34264.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response
- Patch: glibc/2.28/CVE-2024-33600_RHEL-34267-1.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response
- Patch: glibc/2.28/CVE-2024-33600_RHEL-34267-2.patch
- CVE CVE-2024-33601 CVE-2024-33602, CVSSv2 Score: 4.0
- Description:
nscd: netgroup cache assumes NSS callback uses in-buffer strings
- Patch: glibc/2.28/CVE-2024-33601_33602_RHEL-34273.patch