glibc security update addressing symlink attack and information disclosure vulnerability, and fixing related bug
Reporter | Title | Published | Views | Family All 41 |
---|---|---|---|---|
![]() | RHEL 2.1 : glibc (RHSA-2005:261) | 29 Apr 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : glibc (MDKSA-2004:159) | 2 Jan 200500:00 | – | nessus |
![]() | Debian DSA-636-1 : glibc - insecure temporary files | 13 Jan 200500:00 | – | nessus |
![]() | CentOS 3 : glibc (CESA-2005:256) | 3 Jul 200600:00 | – | nessus |
![]() | GLSA-200408-16 : glibc: Information leak with LD_DEBUG | 30 Aug 200400:00 | – | nessus |
![]() | RHEL 3 : glibc (RHSA-2005:256) | 19 May 200500:00 | – | nessus |
![]() | Ubuntu 4.10 : Standard C library script vulnerabilities (USN-4-1) | 15 Jan 200600:00 | – | nessus |
![]() | RHEL 3 : glibc (RHSA-2004:586) | 21 Dec 200400:00 | – | nessus |
![]() | GLSA-200410-19 : glibc: Insecure tempfile handling in catchsegv script | 21 Oct 200400:00 | – | nessus |
![]() | glibc, nscd security update | 29 Apr 200504:46 | – | centos |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | i386 | glibc-devel | 2.2.4-32.20 | glibc-devel-2.2.4-32.20.i386.rpm |
RedHat | any | ia64 | glibc-profile | 2.2.4-32.20 | glibc-profile-2.2.4-32.20.ia64.rpm |
RedHat | any | i386 | glibc-profile | 2.2.4-32.20 | glibc-profile-2.2.4-32.20.i386.rpm |
RedHat | any | i386 | nscd | 2.2.4-32.20 | nscd-2.2.4-32.20.i386.rpm |
RedHat | any | ia64 | nscd | 2.2.4-32.20 | nscd-2.2.4-32.20.ia64.rpm |
RedHat | any | ia64 | glibc-common | 2.2.4-32.20 | glibc-common-2.2.4-32.20.ia64.rpm |
RedHat | any | i686 | glibc | 2.2.4-32.20 | glibc-2.2.4-32.20.i686.rpm |
RedHat | any | ia64 | glibc | 2.2.4-32.20 | glibc-2.2.4-32.20.ia64.rpm |
RedHat | any | i386 | glibc-common | 2.2.4-32.20 | glibc-common-2.2.4-32.20.i386.rpm |
RedHat | any | ia64 | glibc-devel | 2.2.4-32.20 | glibc-devel-2.2.4-32.20.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo