glibc security update with privilege escalation ris
Reporter | Title | Published | Views | Family All 108 |
---|---|---|---|---|
![]() | CentOS Update for glibc CESA-2010:0793 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | CentOS Update for glibc CESA-2010:0793 centos5 i386 | 9 Aug 201100:00 | – | openvas |
![]() | Mandriva Update for glibc MDVSA-2010:212 (glibc) | 26 Oct 201000:00 | – | openvas |
![]() | Oracle: Security Advisory (ELSA-2010-0793) | 6 Oct 201500:00 | – | openvas |
![]() | Fedora Update for glibc FEDORA-2010-16851 | 2 Dec 201000:00 | – | openvas |
![]() | Mandriva Update for glibc MDVSA-2010:212 (glibc) | 26 Oct 201000:00 | – | openvas |
![]() | Slackware Advisory SSA:2010-301-01 glibc | 11 Sep 201200:00 | – | openvas |
![]() | RedHat Update for glibc RHSA-2010:0793-01 | 4 Nov 201000:00 | – | openvas |
![]() | RedHat Update for glibc RHSA-2010:0793-01 | 4 Nov 201000:00 | – | openvas |
![]() | Fedora Update for glibc FEDORA-2010-16851 | 2 Dec 201000:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | glibc-common | 2.5-49.el5_5.7 | glibc-common-2.5-49.el5_5.7.i386.rpm |
RedHat | 5 | ppc | glibc-common | 2.5-49.el5_5.7 | glibc-common-2.5-49.el5_5.7.ppc.rpm |
RedHat | 5 | ppc64 | glibc-devel | 2.5-49.el5_5.7 | glibc-devel-2.5-49.el5_5.7.ppc64.rpm |
RedHat | 5 | s390x | glibc | 2.5-49.el5_5.7 | glibc-2.5-49.el5_5.7.s390x.rpm |
RedHat | 5 | ppc | glibc-devel | 2.5-49.el5_5.7 | glibc-devel-2.5-49.el5_5.7.ppc.rpm |
RedHat | 5 | ia64 | glibc-utils | 2.5-49.el5_5.7 | glibc-utils-2.5-49.el5_5.7.ia64.rpm |
RedHat | 5 | src | glibc | 2.5-49.el5_5.7 | glibc-2.5-49.el5_5.7.src.rpm |
RedHat | 5 | s390x | glibc-common | 2.5-49.el5_5.7 | glibc-common-2.5-49.el5_5.7.s390x.rpm |
RedHat | 5 | i386 | glibc-utils | 2.5-49.el5_5.7 | glibc-utils-2.5-49.el5_5.7.i386.rpm |
RedHat | 5 | ppc64 | glibc | 2.5-49.el5_5.7 | glibc-2.5-49.el5_5.7.ppc64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo