Количество 27
Количество 27
RLSA-2026:1334
Moderate: glibc security update
ELSA-2026-50078
ELSA-2026-50078: glibc security update (MODERATE)
ELSA-2026-1334
ELSA-2026-1334: glibc security update (MODERATE)
SUSE-SU-2026:0371-1
Security update for glibc
RLSA-2026:2786
Moderate: glibc security update
ELSA-2026-50120
ELSA-2026-50120: glibc security update (MODERATE)
ELSA-2026-2786
ELSA-2026-2786: glibc security update (MODERATE)
openSUSE-SU-2026:20133-1
Security update for glibc
SUSE-SU-2026:0896-1
Security update for glibc
CVE-2026-0915
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
CVE-2026-0915
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
CVE-2026-0915
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
CVE-2026-0915
getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler
CVE-2026-0915
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf ...
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe...
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differ...
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe
CVE-2026-0861
Integer overflow in memalign leads to heap corruption
CVE-2026-0861
Passing too large an alignment to the memalign suite of functions (mem ...
GHSA-xp56-6525-9chf
Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
RLSA-2026:1334 Moderate: glibc security update | около 2 месяцев назад | |||
ELSA-2026-50078 ELSA-2026-50078: glibc security update (MODERATE) | около 2 месяцев назад | |||
ELSA-2026-1334 ELSA-2026-1334: glibc security update (MODERATE) | 2 месяца назад | |||
SUSE-SU-2026:0371-1 Security update for glibc | около 2 месяцев назад | |||
RLSA-2026:2786 Moderate: glibc security update | около 1 месяца назад | |||
ELSA-2026-50120 ELSA-2026-50120: glibc security update (MODERATE) | около 1 месяца назад | |||
ELSA-2026-2786 ELSA-2026-2786: glibc security update (MODERATE) | около 1 месяца назад | |||
openSUSE-SU-2026:20133-1 Security update for glibc | около 2 месяцев назад | |||
SUSE-SU-2026:0896-1 Security update for glibc | 16 дней назад | |||
CVE-2026-0915 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. | CVSS3: 7.5 | 0% Низкий | 2 месяца назад | |
CVE-2026-0915 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. | CVSS3: 5.3 | 0% Низкий | 2 месяца назад | |
CVE-2026-0915 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. | CVSS3: 7.5 | 0% Низкий | 2 месяца назад | |
CVE-2026-0915 getnetbyaddr and getnetbyaddr_r leak stack contents to DNS resovler | CVSS3: 2.9 | 0% Низкий | 2 месяца назад | |
CVE-2026-0915 Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf ... | CVSS3: 7.5 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe... | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differ... | CVSS3: 8.1 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption. Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this. The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument. This limits the malicious inputs for the alignment for memalign to the range [1<<62+ 1, 1<<63] and exactly 1<<63 for posix_memalign and aligned_alloc. Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice. An application bug could potentially result in the input alignment being too large, e.g. due to a differe | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
CVE-2026-0861 Integer overflow in memalign leads to heap corruption | CVSS3: 7.3 | 0% Низкий | около 1 месяца назад | |
CVE-2026-0861 Passing too large an alignment to the memalign suite of functions (mem ... | CVSS3: 8.4 | 0% Низкий | 2 месяца назад | |
GHSA-xp56-6525-9chf Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver. | CVSS3: 7.5 | 0% Низкий | 2 месяца назад |
Уязвимостей на страницу