glibc security update for heap-based buffer overflow and arbitrary code executio
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Scientific Linux Security Update : glibc on SL4.x i386/x86_64 (20120213) | 1 Aug 201200:00 | – | nessus |
![]() | Oracle Linux 4 : glibc (ELSA-2012-0125) | 12 Jul 201300:00 | – | nessus |
![]() | CentOS 4 : glibc (CESA-2012:0125) | 14 Feb 201200:00 | – | nessus |
![]() | RHEL 4 : glibc (RHSA-2012:0125) | 14 Feb 201200:00 | – | nessus |
![]() | Oracle Linux 5 : glibc (ELSA-2012-0126) | 12 Jul 201300:00 | – | nessus |
![]() | CentOS 5 : glibc (CESA-2012:0126) | 14 Feb 201200:00 | – | nessus |
![]() | RHEL 5 : glibc (RHSA-2012:0126) | 14 Feb 201200:00 | – | nessus |
![]() | Scientific Linux Security Update : glibc on SL5.x i386/x86_64 (20120213) | 1 Aug 201200:00 | – | nessus |
![]() | Mandriva Linux Security Advisory : glibc (MDVSA-2011:179) | 6 Sep 201200:00 | – | nessus |
![]() | Ubuntu 8.04 LTS / 10.04 LTS / 10.10 / 11.04 / 11.10 : eglibc, glibc vulnerabilities (USN-1396-1) | 12 Mar 201200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | src | glibc | 2.3.4-2.57 | glibc-2.3.4-2.57.src.rpm |
RedHat | any | i386 | glibc-common | 2.3.4-2.57 | glibc-common-2.3.4-2.57.i386.rpm |
RedHat | any | ia64 | glibc-profile | 2.3.4-2.57 | glibc-profile-2.3.4-2.57.ia64.rpm |
RedHat | any | x86_64 | glibc-devel | 2.3.4-2.57 | glibc-devel-2.3.4-2.57.x86_64.rpm |
RedHat | any | x86_64 | glibc-common | 2.3.4-2.57 | glibc-common-2.3.4-2.57.x86_64.rpm |
RedHat | any | ia64 | nptl-devel | 2.3.4-2.57 | nptl-devel-2.3.4-2.57.ia64.rpm |
RedHat | any | ppc | nptl-devel | 2.3.4-2.57 | nptl-devel-2.3.4-2.57.ppc.rpm |
RedHat | any | ppc | glibc-common | 2.3.4-2.57 | glibc-common-2.3.4-2.57.ppc.rpm |
RedHat | any | i686 | nptl-devel | 2.3.4-2.57 | nptl-devel-2.3.4-2.57.i686.rpm |
RedHat | any | s390x | glibc | 2.3.4-2.57 | glibc-2.3.4-2.57.s390x.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo