Количество 37
Количество 37

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
CVE-2023-4527
A flaw was found in glibc. When the getaddrinfo function is called wit ...

CVE-2023-4911
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

CVE-2023-4911
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

CVE-2023-4911
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.

CVE-2023-4911
CVE-2023-4911
A buffer overflow was discovered in the GNU C Library's dynamic loader ...
GHSA-hmf7-f8gf-8f4p
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

BDU:2023-06332
Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании
GHSA-m77w-6vjw-wh2f
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
ELSA-2023-12854
ELSA-2023-12854: glibc security update (IMPORTANT)
ELSA-2023-12853
ELSA-2023-12853: glibc security update (IMPORTANT)
ELSA-2023-12851
ELSA-2023-12851: glibc security update (IMPORTANT)
ELSA-2023-12850
ELSA-2023-12850: glibc security update (IMPORTANT)

BDU:2023-06269
Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
![]() | CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
CVE-2023-4527 A flaw was found in glibc. When the getaddrinfo function is called wit ... | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
![]() | CVE-2023-4911 A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | CVSS3: 7.8 | 75% Высокий | больше 1 года назад |
![]() | CVE-2023-4911 A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | CVSS3: 7.8 | 75% Высокий | больше 1 года назад |
![]() | CVE-2023-4911 A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | CVSS3: 7.8 | 75% Высокий | больше 1 года назад |
![]() | CVSS3: 7.8 | 75% Высокий | больше 1 года назад | |
CVE-2023-4911 A buffer overflow was discovered in the GNU C Library's dynamic loader ... | CVSS3: 7.8 | 75% Высокий | больше 1 года назад | |
GHSA-hmf7-f8gf-8f4p A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. | CVSS3: 6.5 | 0% Низкий | почти 2 года назад | |
![]() | BDU:2023-06332 Уязвимость функции getaddrinfo системной библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 6.5 | 0% Низкий | почти 2 года назад |
GHSA-m77w-6vjw-wh2f A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges. | CVSS3: 7.8 | 75% Высокий | больше 1 года назад | |
ELSA-2023-12854 ELSA-2023-12854: glibc security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12853 ELSA-2023-12853: glibc security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12851 ELSA-2023-12851: glibc security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2023-12850 ELSA-2023-12850: glibc security update (IMPORTANT) | больше 1 года назад | |||
![]() | BDU:2023-06269 Уязвимость динамического загрузчика ld.so библиотеки glibc, позволяющая нарушителю выполнить произвольный код c повышенными привилегиями | CVSS3: 7.8 | 75% Высокий | больше 1 года назад |
Уязвимостей на страницу