[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252097

 
 

909

 
 

196747

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2-2021-1605 --- glibc

ID: oval:org.secpod.oval:def:1700562Date: (C)2021-02-22   (M)2023-11-16
Class: PATCHFamily: unix




The iconv program in the GNU C Library 2.31 and earlier, when invoked with multiple suffixes in the destination encoding along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of a buffer, resulting in a segmentation fault. The highest threat from this vulnerability is to system availability. A denial of service flaw was found in the way glibc"s iconv function handled UCS4 text containing an irreversible character. This flaw causes an application compiled with glibc and using the vulnerable function to terminate with an assertion, resulting in a denial of service. The highest threat from this vulnerability is to system availability. A signed comparison vulnerability was found in GNU libc in the ARMv7 implementation of memcpy. The flaw affects the third argument to memcpy that specifies the number of bytes to copy. An underflow on the third argument could lead to undefined behavior such as out-of-bounds memory write and potentially remote code execution

Platform:
Amazon Linux 2
Product:
glibc
Reference:
ALAS2-2021-1605
CVE-2016-10228
CVE-2019-25013
CVE-2020-29562
CVE-2020-6096
CVE    4
CVE-2020-6096
CVE-2020-29562
CVE-2016-10228
CVE-2019-25013
...

© SecPod Technologies