Search CVE reports
1 – 10 of 169 results
The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to validate the RDATA content against the RDATA length in a DNS response when processing LOC, CERT, TKEY or...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| eglibc | Not in release | Not in release | Not in release | — | — |
The deprecated functions ns_printrrf, ns_printrr and fp_nquery in the GNU C Library version 2.2 and newer fail to enforce the caller-supplied buffer length, and can result in an out-of-bounds write when printing TSIG records.
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| eglibc | Not in release | Not in release | Not in release | — | — |
Calling the ungetwc function on a FILE stream with wide characters encoded in a character set that has overlaps between its single byte and multi-byte character encodings, in the GNU C Library version 2.43 or earlier, may result...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| eglibc | Not in release | Not in release | Not in release | — | — |
Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation | Needs evaluation |
| eglibc | Not in release | Not in release | Not in release | — | — |
Rejected reason: REJECTED: CVE-2026-5358 is rejected for two reasons. Firstly it has been discovered that no NIS+ client or server was ever released for any Linux-based OS distributions and as such this makes the API...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Not affected | Not affected | Not affected | Not affected | Not affected |
| eglibc | Not in release | Not in release | Not in release | — | — |
The iconv() function in the GNU C Library versions 2.43 and earlier may crash due to an assertion failure when converting inputs from the IBM1390 or IBM1399 character sets, which may be used to remotely crash an application. This...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Vulnerable | Vulnerable | Vulnerable | Vulnerable | Vulnerable |
| eglibc | Not in release | Not in release | Not in release | — | — |
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C library version 2.34 to version 2.43 could result in an invalid DNS hostname being returned to the...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Vulnerable | Vulnerable | Vulnerable | Not affected | Not affected |
| eglibc | Not in release | Not in release | Not in release | — | — |
Calling gethostbyaddr or gethostbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend in the GNU C Library version 2.34 to version 2.43 could, with a crafted response from the configured DNS server,...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | Vulnerable | Vulnerable | Vulnerable | Not affected | Not affected |
| eglibc | Not in release | Not in release | Not in release | — | — |
Calling NSS-backed functions that support caching via nscd may call the nscd client side code and in the GNU C Library version 2.36 under high load on x86_64 systems, the client may call memcmp on inputs that are concurrently...
2 affected packages
glibc, eglibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| glibc | — | Not affected | Not affected | Not affected | Not affected |
| eglibc | — | Not in release | Not in release | — | — |
An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a...
2 affected packages
eglibc, glibc
| Package | 26.04 LTS | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
|---|---|---|---|---|---|
| eglibc | — | Not in release | Not in release | Not in release | — |
| glibc | — | Not affected | Not affected | Not affected | Not affected |