glibc security update for Debian 10 buster, fixing out-of-bounds write in iconv ISO-2022-CN-EXT modul
Reporter | Title | Published | Views | Family All 104 |
---|---|---|---|---|
OSV | glibc vulnerability | 18 Apr 202411:58 | – | osv |
OSV | glibc - security update | 23 Apr 202400:00 | – | osv |
OSV | glibc - security update | 4 May 202400:00 | – | osv |
OSV | glibc vulnerability | 29 Apr 202411:27 | – | osv |
OSV | CGA-ggg2-x536-4h5p | 6 Jun 202412:27 | – | osv |
OSV | eglibc, glibc vulnerabilities | 2 May 202412:45 | – | osv |
GithubExploit | Exploit for CVE-2024-2961 | 20 May 202406:53 | – | githubexploit |
GithubExploit | Exploit for CVE-2024-2961 | 3 Jun 202423:53 | – | githubexploit |
GithubExploit | Exploit for CVE-2024-2961 | 4 Jun 202408:05 | – | githubexploit |
GithubExploit | Exploit for CVE-2024-2961 | 27 May 202408:30 | – | githubexploit |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 10 | all | glibc-doc | 2.28-10+deb10u3 | glibc-doc_2.28-10+deb10u3_all.deb |
Debian | 10 | amd64 | libc6 | 2.28-10+deb10u3 | libc6_2.28-10+deb10u3_amd64.deb |
Debian | 10 | armhf | libc-bin | 2.28-10+deb10u3 | libc-bin_2.28-10+deb10u3_armhf.deb |
Debian | 11 | mips64el | libc-dev-bin | 2.31-13+deb11u9 | libc-dev-bin_2.31-13+deb11u9_mips64el.deb |
Debian | 12 | ppc64el | libc-bin-dbgsym | 2.36-9+deb12u6 | libc-bin-dbgsym_2.36-9+deb12u6_ppc64el.deb |
Debian | 11 | mipsel | libc6-mipsn32-dbgsym | 2.31-13+deb11u9 | libc6-mipsn32-dbgsym_2.31-13+deb11u9_mipsel.deb |
Debian | 12 | s390x | libc6-s390 | 2.36-9+deb12u6 | libc6-s390_2.36-9+deb12u6_s390x.deb |
Debian | 12 | i386 | libc-devtools | 2.36-9+deb12u6 | libc-devtools_2.36-9+deb12u6_i386.deb |
Debian | 10 | i386 | libc-bin | 2.28-10+deb10u3 | libc-bin_2.28-10+deb10u3_i386.deb |
Debian | 12 | armhf | libc6-udeb | 2.36-9+deb12u6 | libc6-udeb_2.36-9+deb12u6_armhf.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo