Количество 37
Количество 37
ELSA-2023-12850
ELSA-2023-12850: glibc security update (IMPORTANT)

BDU:2023-06269
Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called wit ...

CVE-2023-4813
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVE-2023-4813
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

CVE-2023-4813
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
CVE-2023-4813
A flaw was found in glibc. In an uncommon situation, the gaih_inet fun ...
GHSA-hmf7-f8gf-8f4p
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

BDU:2023-06332
Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании

SUSE-SU-2023:4110-1
Security update for glibc

SUSE-SU-2023:4047-1
Security update for glibc

SUSE-RU-2023:4063-1
Recommended update for glibc
GHSA-qx6j-g797-jg9r
A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

BDU:2023-05969
Уязвимость компонента nsswitch.conf библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2023-12850 ELSA-2023-12850: glibc security update (IMPORTANT) | больше 1 года назад | |||
![]() | BDU:2023-06269 Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями | CVSS3: 7.8 | 75% Высокий | больше 1 года назад |
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called wit ... | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-4813 A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4813 A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. | CVSS3: 5.9 | 0% Низкий | больше 3 лет назад |
![]() | CVE-2023-4813 A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
CVE-2023-4813 A flaw was found in glibc. In an uncommon situation, the gaih_inet fun ... | CVSS3: 5.9 | 0% Низкий | почти 2 года назад | |
GHSA-hmf7-f8gf-8f4p A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-06332 Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | SUSE-SU-2023:4110-1 Security update for glibc | 0% Низкий | больше 1 года назад | |
![]() | SUSE-SU-2023:4047-1 Security update for glibc | 0% Низкий | больше 1 года назад | |
![]() | SUSE-RU-2023:4063-1 Recommended update for glibc | 0% Низкий | больше 1 года назад | |
GHSA-qx6j-g797-jg9r A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. | CVSS3: 5.9 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-05969 Уязвимость компонента nsswitch.conf библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.9 | 0% Низкий | почти 2 года назад |
Уязвимостей на страницу