Search for packages
purl | pkg:alpm/archlinux/lib32-glibc@2.37-2 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-jzgu-ab1k-aaaq | sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes. |
CVE-2023-25139
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:44:00.449675+00:00 | Arch Linux Importer | Fixing | VCID-jzgu-ab1k-aaaq | https://security.archlinux.org/AVG-2833 | 36.0.0 |
2024-09-28T20:47:40.191608+00:00 | Arch Linux Importer | Fixing | VCID-jzgu-ab1k-aaaq | https://security.archlinux.org/AVG-2833 | 34.0.1 |
2024-01-03T22:25:26.741735+00:00 | Arch Linux Importer | Fixing | VCID-jzgu-ab1k-aaaq | https://security.archlinux.org/AVG-2833 | 34.0.0rc1 |