Количество 23
Количество 23
ELSA-2016-0176
ELSA-2016-0176: glibc security and bug fix update (CRITICAL)

CVE-2015-5229
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVE-2015-5229
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

CVE-2015-5229
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.
CVE-2015-5229
The calloc function in the glibc package in Red Hat Enterprise Linux ( ...

CVE-2015-7547
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVE-2015-7547
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.

CVE-2015-7547
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
CVE-2015-7547
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ...
GHSA-vhfq-hmc6-hfjh
The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors.

SUSE-RU-2016:0496-1
Recommended update for certification-sles-eal4
GHSA-5xr7-h7cp-w9pc
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
ELSA-2016-0175
ELSA-2016-0175: glibc security and bug fix update (CRITICAL)

BDU:2017-00283
Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код

BDU:2016-00434
Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код

openSUSE-SU-2016:0490-1
Security update for glibc

SUSE-SU-2016:0473-1
Security update for glibc

SUSE-SU-2016:0472-1
Security update for glibc

SUSE-SU-2016:0471-1
Security update for glibc

SUSE-SU-2016:0470-1
Security update for glibc
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2016-0176 ELSA-2016-0176: glibc security and bug fix update (CRITICAL) | больше 9 лет назад | |||
![]() | CVE-2015-5229 The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors. | CVSS3: 7.5 | 1% Низкий | больше 9 лет назад |
![]() | CVE-2015-5229 The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors. | CVSS2: 2.6 | 1% Низкий | около 10 лет назад |
![]() | CVE-2015-5229 The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors. | CVSS3: 7.5 | 1% Низкий | больше 9 лет назад |
CVE-2015-5229 The calloc function in the glibc package in Red Hat Enterprise Linux ( ... | CVSS3: 7.5 | 1% Низкий | больше 9 лет назад | |
![]() | CVE-2015-7547 Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. | CVSS3: 8.1 | 92% Критический | больше 9 лет назад |
![]() | CVE-2015-7547 Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. | CVSS2: 6.8 | 92% Критический | больше 9 лет назад |
![]() | CVE-2015-7547 Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. | CVSS3: 8.1 | 92% Критический | больше 9 лет назад |
CVE-2015-7547 Multiple stack-based buffer overflows in the (1) send_dg and (2) send_ ... | CVSS3: 8.1 | 92% Критический | больше 9 лет назад | |
GHSA-vhfq-hmc6-hfjh The calloc function in the glibc package in Red Hat Enterprise Linux (RHEL) 6.7 and 7.2 does not properly initialize memory areas, which might allow context-dependent attackers to cause a denial of service (hang or crash) via unspecified vectors. | CVSS3: 7.5 | 1% Низкий | больше 3 лет назад | |
![]() | SUSE-RU-2016:0496-1 Recommended update for certification-sles-eal4 | 92% Критический | больше 9 лет назад | |
GHSA-5xr7-h7cp-w9pc Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module. | CVSS3: 8.1 | 92% Критический | больше 3 лет назад | |
ELSA-2016-0175 ELSA-2016-0175: glibc security and bug fix update (CRITICAL) | больше 9 лет назад | |||
![]() | BDU:2017-00283 Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код | CVSS2: 6.8 | 92% Критический | больше 9 лет назад |
![]() | BDU:2016-00434 Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код | CVSS2: 9.3 | 92% Критический | больше 9 лет назад |
![]() | openSUSE-SU-2016:0490-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0473-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0472-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0471-1 Security update for glibc | больше 9 лет назад | ||
![]() | SUSE-SU-2016:0470-1 Security update for glibc | больше 9 лет назад |
Уязвимостей на страницу