Search for packages
purl | pkg:alpm/archlinux/lib32-glibc@2.32-5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-c3ax-wdga-aaam
Aliases: CVE-2021-3326 |
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. |
Affected by 0 other vulnerabilities. |
VCID-k9gp-cakq-aaak
Aliases: CVE-2019-25013 |
The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. |
Affected by 0 other vulnerabilities. |
VCID-t33k-37qm-aaan
Aliases: CVE-2020-29562 |
The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. |
Affected by 0 other vulnerabilities. |
VCID-tb83-ecmn-aaag
Aliases: CVE-2020-29573 |
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference. | There are no reported fixed by versions. |
VCID-zsrq-e5ww-aaaf
Aliases: CVE-2020-27618 |
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228. |
Affected by 0 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:05.221164+00:00 | Arch Linux Importer | Affected by | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.198404+00:00 | Arch Linux Importer | Affected by | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.175898+00:00 | Arch Linux Importer | Affected by | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.151535+00:00 | Arch Linux Importer | Affected by | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:46:45.327369+00:00 | Arch Linux Importer | Affected by | VCID-tb83-ecmn-aaag | https://security.archlinux.org/AVG-1324 | 36.0.0 |
2024-09-28T20:47:42.530261+00:00 | Arch Linux Importer | Affected by | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.507839+00:00 | Arch Linux Importer | Affected by | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.485916+00:00 | Arch Linux Importer | Affected by | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.465380+00:00 | Arch Linux Importer | Affected by | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.100818+00:00 | Arch Linux Importer | Affected by | VCID-tb83-ecmn-aaag | https://security.archlinux.org/AVG-1324 | 34.0.1 |
2024-01-31T12:10:01.507186+00:00 | Arch Linux Importer | Affected by | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.480760+00:00 | Arch Linux Importer | Affected by | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.454008+00:00 | Arch Linux Importer | Affected by | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.427093+00:00 | Arch Linux Importer | Affected by | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-03T22:28:29.552586+00:00 | Arch Linux Importer | Affected by | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.526372+00:00 | Arch Linux Importer | Affected by | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.498145+00:00 | Arch Linux Importer | Affected by | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.469676+00:00 | Arch Linux Importer | Affected by | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:08.660110+00:00 | Arch Linux Importer | Affected by | VCID-tb83-ecmn-aaag | https://security.archlinux.org/AVG-1324 | 34.0.0rc1 |