Search for packages
Package details: pkg:alpm/archlinux/lib32-glibc@2.37-2
purl pkg:alpm/archlinux/lib32-glibc@2.37-2
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (1)
Vulnerability Summary Aliases
VCID-jzgu-ab1k-aaaq sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes. CVE-2023-25139

Date Actor Action Vulnerability Source VulnerableCode Version
2025-03-28T07:44:00.449675+00:00 Arch Linux Importer Fixing VCID-jzgu-ab1k-aaaq https://security.archlinux.org/AVG-2833 36.0.0
2024-09-28T20:47:40.191608+00:00 Arch Linux Importer Fixing VCID-jzgu-ab1k-aaaq https://security.archlinux.org/AVG-2833 34.0.1
2024-01-03T22:25:26.741735+00:00 Arch Linux Importer Fixing VCID-jzgu-ab1k-aaaq https://security.archlinux.org/AVG-2833 34.0.0rc1