Количество 16
Количество 16
BDU:2023-07722
Уязвимость системной библиотеки GNU C Library, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
CVE-2017-1000366
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
CVE-2017-1000366
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
CVE-2017-1000366
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
CVE-2017-1000366
glibc contains a vulnerability that allows specially crafted LD_LIBRAR ...
openSUSE-SU-2017:1629-1
Security update for glibc
SUSE-SU-2017:1621-1
Security update for glibc
SUSE-SU-2017:1619-1
Security update for glibc
SUSE-SU-2017:1614-1
Security update for glibc
SUSE-SU-2017:1611-1
Security update for glibc
GHSA-45fw-2mcw-h3gw
glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
ELSA-2017-1481
ELSA-2017-1481: glibc security update (IMPORTANT)
ELSA-2017-1480
ELSA-2017-1480: glibc security update (IMPORTANT)
ELSA-2017-1479
ELSA-2017-1479: glibc security update (IMPORTANT)
SUSE-SU-2017:2699-1
Security update for SLES 12 Docker image
SUSE-SU-2017:2700-1
Security update for SLES 12-SP1 Docker image
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2023-07722 Уязвимость системной библиотеки GNU C Library, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании | CVSS3: 7.8 | 8% Низкий | больше 8 лет назад | |
CVE-2017-1000366 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. | CVSS3: 7.8 | 8% Низкий | больше 8 лет назад | |
CVE-2017-1000366 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. | CVSS3: 7.4 | 8% Низкий | больше 8 лет назад | |
CVE-2017-1000366 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. | CVSS3: 7.8 | 8% Низкий | больше 8 лет назад | |
CVE-2017-1000366 glibc contains a vulnerability that allows specially crafted LD_LIBRAR ... | CVSS3: 7.8 | 8% Низкий | больше 8 лет назад | |
openSUSE-SU-2017:1629-1 Security update for glibc | 8% Низкий | больше 8 лет назад | ||
SUSE-SU-2017:1621-1 Security update for glibc | 8% Низкий | больше 8 лет назад | ||
SUSE-SU-2017:1619-1 Security update for glibc | 8% Низкий | больше 8 лет назад | ||
SUSE-SU-2017:1614-1 Security update for glibc | 8% Низкий | больше 8 лет назад | ||
SUSE-SU-2017:1611-1 Security update for glibc | 8% Низкий | больше 8 лет назад | ||
GHSA-45fw-2mcw-h3gw glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier. | CVSS3: 7.8 | 8% Низкий | больше 3 лет назад | |
ELSA-2017-1481 ELSA-2017-1481: glibc security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-1480 ELSA-2017-1480: glibc security update (IMPORTANT) | больше 8 лет назад | |||
ELSA-2017-1479 ELSA-2017-1479: glibc security update (IMPORTANT) | больше 8 лет назад | |||
SUSE-SU-2017:2699-1 Security update for SLES 12 Docker image | около 8 лет назад | |||
SUSE-SU-2017:2700-1 Security update for SLES 12-SP1 Docker image | около 8 лет назад |
Уязвимостей на страницу