Количество 20
Количество 20
ELSA-2015-0863
ELSA-2015-0863: glibc security and bug fix update (MODERATE)
ELSA-2015-2199
ELSA-2015-2199: glibc security, bug fix, and enhancement update (MODERATE)

CVE-2015-1781
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.

CVE-2015-1781
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.

CVE-2015-1781
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
CVE-2015-1781
Buffer overflow in the gethostbyname_r and other unspecified NSS funct ...

CVE-2013-7423
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVE-2013-7423
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

CVE-2013-7423
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.
CVE-2013-7423
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc ...
GHSA-w9wj-9x52-h75c
Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer.
GHSA-7q6m-8g97-jq6m
The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function.

SUSE-SU-2015:1844-1
Security update for glibc

SUSE-SU-2015:1424-1
Security update for glibc

SUSE-SU-2015:0526-1
Security update for glibc

SUSE-SU-2016:0470-1
Security update for glibc

SUSE-SU-2015:0439-1
Security update for glibc

SUSE-SU-2015:0253-1
Security update for glibc

SUSE-RU-2015:0794-1
Security update for glibc

SUSE-SU-2015:0551-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2015-0863 ELSA-2015-0863: glibc security and bug fix update (MODERATE) | около 10 лет назад | |||
ELSA-2015-2199 ELSA-2015-2199: glibc security, bug fix, and enhancement update (MODERATE) | больше 9 лет назад | |||
![]() | CVE-2015-1781 Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer. | CVSS2: 6.8 | 5% Низкий | больше 9 лет назад |
![]() | CVE-2015-1781 Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer. | CVSS2: 5.1 | 5% Низкий | около 10 лет назад |
![]() | CVE-2015-1781 Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer. | CVSS2: 6.8 | 5% Низкий | больше 9 лет назад |
CVE-2015-1781 Buffer overflow in the gethostbyname_r and other unspecified NSS funct ... | CVSS2: 6.8 | 5% Низкий | больше 9 лет назад | |
![]() | CVE-2013-7423 The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function. | CVSS2: 5 | 4% Низкий | больше 10 лет назад |
![]() | CVE-2013-7423 The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function. | CVSS2: 1.2 | 4% Низкий | почти 12 лет назад |
![]() | CVE-2013-7423 The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function. | CVSS2: 5 | 4% Низкий | больше 10 лет назад |
CVE-2013-7423 The send_dg function in resolv/res_send.c in GNU C Library (aka glibc ... | CVSS2: 5 | 4% Низкий | больше 10 лет назад | |
GHSA-w9wj-9x52-h75c Buffer overflow in the gethostbyname_r and other unspecified NSS functions in the GNU C Library (aka glibc or libc6) before 2.22 allows context-dependent attackers to cause a denial of service (crash) or execute arbitrary code via a crafted DNS response, which triggers a call with a misaligned buffer. | 5% Низкий | около 3 лет назад | ||
GHSA-7q6m-8g97-jq6m The send_dg function in resolv/res_send.c in GNU C Library (aka glibc or libc6) before 2.20 does not properly reuse file descriptors, which allows remote attackers to send DNS queries to unintended locations via a large number of requests that trigger a call to the getaddrinfo function. | 4% Низкий | около 3 лет назад | ||
![]() | SUSE-SU-2015:1844-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2015:1424-1 Security update for glibc | почти 10 лет назад | ||
![]() | SUSE-SU-2015:0526-1 Security update for glibc | больше 10 лет назад | ||
![]() | SUSE-SU-2016:0470-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2015:0439-1 Security update for glibc | почти 11 лет назад | ||
![]() | SUSE-SU-2015:0253-1 Security update for glibc | почти 11 лет назад | ||
![]() | SUSE-RU-2015:0794-1 Security update for glibc | почти 11 лет назад | ||
![]() | SUSE-SU-2015:0551-1 Security update for glibc | почти 12 лет назад |
Уязвимостей на страницу