Количество 10
Количество 10

CVE-2023-0687
** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVE-2023-0687
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVE-2023-0687
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.
CVE-2023-0687
A vulnerability was found in GNU C Library 2.38. It has been declared ...

SUSE-SU-2023:1718-1
Security update for glibc

ROS-20230210-03
Уязвимость GNU C Library
GHSA-5r4p-4pqv-gqhw
A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability.

BDU:2023-00731
Уязвимость функции __monstartup файла gmon.c библиотеки системных вызовов и основных функций GNU C (glibc), позволяющая нарушителю позволяющая нарушителю получить доступ к конфиденциальным данным

SUSE-SU-2023:3825-1
Security update for binutils

SUSE-SU-2023:3695-1
Security update for binutils
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-0687 ** DISPUTED ** A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. | CVSS3: 4.6 | 0% Низкий | больше 2 лет назад |
![]() | CVE-2023-0687 A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. | 0% Низкий | больше 2 лет назад | |
![]() | CVE-2023-0687 A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled. | CVSS3: 4.6 | 0% Низкий | больше 2 лет назад |
CVE-2023-0687 A vulnerability was found in GNU C Library 2.38. It has been declared ... | CVSS3: 4.6 | 0% Низкий | больше 2 лет назад | |
![]() | SUSE-SU-2023:1718-1 Security update for glibc | 0% Низкий | около 2 лет назад | |
![]() | ROS-20230210-03 Уязвимость GNU C Library | CVSS3: 4.6 | 0% Низкий | больше 2 лет назад |
GHSA-5r4p-4pqv-gqhw A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. | CVSS3: 9.8 | 0% Низкий | больше 2 лет назад | |
![]() | BDU:2023-00731 Уязвимость функции __monstartup файла gmon.c библиотеки системных вызовов и основных функций GNU C (glibc), позволяющая нарушителю позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 4.6 | 0% Низкий | больше 2 лет назад |
![]() | SUSE-SU-2023:3825-1 Security update for binutils | больше 1 года назад | ||
![]() | SUSE-SU-2023:3695-1 Security update for binutils | почти 2 года назад |
Уязвимостей на страницу