Количество 32
Количество 32
ELSA-2021-9560
ELSA-2021-9560: glibc security update (MODERATE)
ELSA-2021-4358
ELSA-2021-4358: glibc security, bug fix, and enhancement update (MODERATE)

openSUSE-SU-2021:3291-1
Security update for glibc

openSUSE-SU-2021:1374-1
Security update for glibc

SUSE-SU-2021:3385-1
Security update for glibc

SUSE-SU-2021:3291-1
Security update for glibc

SUSE-SU-2021:3289-1
Security update for glibc

SUSE-SU-2021:14822-1
Security update for glibc

CVE-2021-27645
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.

CVE-2021-27645
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.

CVE-2021-27645
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.
CVE-2021-27645
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc o ...
GHSA-2hpw-5cjm-953f
The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c.

BDU:2022-05689
Уязвимость компонента netgroupcache.c демона кэширования сервера имен nscd системной библиотеки GNU C Library, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2021-33574
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

CVE-2021-33574
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

CVE-2021-33574
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact.

CVE-2021-33574
CVE-2021-33574
The mq_notify function in the GNU C Library (aka glibc) versions 2.32 ...

CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2021-9560 ELSA-2021-9560: glibc security update (MODERATE) | больше 3 лет назад | |||
ELSA-2021-4358 ELSA-2021-4358: glibc security, bug fix, and enhancement update (MODERATE) | больше 3 лет назад | |||
![]() | openSUSE-SU-2021:3291-1 Security update for glibc | больше 3 лет назад | ||
![]() | openSUSE-SU-2021:1374-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3385-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3291-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2021:3289-1 Security update for glibc | больше 3 лет назад | ||
![]() | SUSE-SU-2021:14822-1 Security update for glibc | больше 3 лет назад | ||
![]() | CVE-2021-27645 The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. | CVSS3: 2.5 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-27645 The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. | CVSS3: 2.5 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-27645 The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. | CVSS3: 2.5 | 0% Низкий | больше 4 лет назад |
CVE-2021-27645 The nameserver caching daemon (nscd) in the GNU C Library (aka glibc o ... | CVSS3: 2.5 | 0% Низкий | больше 4 лет назад | |
GHSA-2hpw-5cjm-953f The nameserver caching daemon (nscd) in the GNU C Library (aka glibc or libc6) 2.29 through 2.33, when processing a request for netgroup lookup, may crash due to a double-free, potentially resulting in degraded service or Denial of Service on the local system. This is related to netgroupcache.c. | CVSS3: 2.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2022-05689 Уязвимость компонента netgroupcache.c демона кэширования сервера имен nscd системной библиотеки GNU C Library, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 2.5 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-33574 The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-33574 The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. | CVSS3: 5.9 | 0% Низкий | около 4 лет назад |
![]() | CVE-2021-33574 The mq_notify function in the GNU C Library (aka glibc) versions 2.32 and 2.33 has a use-after-free. It may use the notification thread attributes object (passed through its struct sigevent parameter) after it has been freed by the caller, leading to a denial of service (application crash) or possibly unspecified other impact. | CVSS3: 9.8 | 0% Низкий | около 4 лет назад |
![]() | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
CVE-2021-33574 The mq_notify function in the GNU C Library (aka glibc) versions 2.32 ... | CVSS3: 9.8 | 0% Низкий | около 4 лет назад | |
![]() | CVE-2021-35942 The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations. | CVSS3: 9.1 | 1% Низкий | почти 4 года назад |
Уязвимостей на страницу