Search for packages
purl | pkg:alpm/archlinux/lib32-glibc@2.33-1 |
Vulnerability | Summary | Fixed by |
---|---|---|
This package is not known to be affected by vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
VCID-c3ax-wdga-aaam | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. |
CVE-2021-3326
|
VCID-k9gp-cakq-aaak | The iconv feature in the GNU C Library (aka glibc or libc6) through 2.32, when processing invalid multi-byte input sequences in the EUC-KR encoding, may have a buffer over-read. |
CVE-2019-25013
|
VCID-t33k-37qm-aaan | The iconv function in the GNU C Library (aka glibc or libc6) 2.30 to 2.32, when converting UCS4 text containing an irreversible character, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service. |
CVE-2020-29562
|
VCID-zsrq-e5ww-aaaf | The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228. |
CVE-2020-27618
|
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|---|---|---|---|---|
2025-03-28T07:47:05.226191+00:00 | Arch Linux Importer | Fixing | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.203314+00:00 | Arch Linux Importer | Fixing | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.180753+00:00 | Arch Linux Importer | Fixing | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2025-03-28T07:47:05.157298+00:00 | Arch Linux Importer | Fixing | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 36.0.0 |
2024-09-28T20:47:42.535390+00:00 | Arch Linux Importer | Fixing | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.512650+00:00 | Arch Linux Importer | Fixing | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.490771+00:00 | Arch Linux Importer | Fixing | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-09-28T20:47:42.469774+00:00 | Arch Linux Importer | Fixing | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.1 |
2024-01-31T12:10:01.511885+00:00 | Arch Linux Importer | Fixing | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.485473+00:00 | Arch Linux Importer | Fixing | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.458774+00:00 | Arch Linux Importer | Fixing | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-31T12:10:01.431803+00:00 | Arch Linux Importer | Fixing | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.0rc2 |
2024-01-03T22:28:29.557313+00:00 | Arch Linux Importer | Fixing | VCID-k9gp-cakq-aaak | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.531097+00:00 | Arch Linux Importer | Fixing | VCID-zsrq-e5ww-aaaf | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.502828+00:00 | Arch Linux Importer | Fixing | VCID-t33k-37qm-aaan | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |
2024-01-03T22:28:29.474354+00:00 | Arch Linux Importer | Fixing | VCID-c3ax-wdga-aaam | https://security.archlinux.org/AVG-1320 | 34.0.0rc1 |