Search for packages
purl | pkg:alpm/archlinux/glibc@2.37-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-jzgu-ab1k-aaaq
Aliases: CVE-2023-25139 |
sprintf in the GNU C Library (glibc) 2.37 has a buffer overflow (out-of-bounds write) in some situations with a correct buffer size. This is unrelated to CWE-676. It may write beyond the bounds of the destination buffer when attempting to write a padded, thousands-separated string representation of a number, if the buffer is allocated the exact size required to represent that number as a string. For example, 1,234,567 (with padding to 13) overflows by two bytes. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2024-09-18T01:59:08.818313+00:00 | Arch Linux Importer | Affected by | VCID-jzgu-ab1k-aaaq | https://security.archlinux.org/AVG-2833 | 34.0.1 |
2024-06-15T20:59:56.300626+00:00 | Arch Linux Importer | Affected by | VCID-jzgu-ab1k-aaaq | https://security.archlinux.org/AVG-2833 | 34.0.0rc4 |