glibc security update with buffer overflow and privilege escalation vulnerabilitie
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Scientific Linux Security Update : glibc on SL5.x i386/x86_64 (20120213) | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 5 : glibc (CESA-2012:0126) | 14 Feb 201200:00 | – | nessus |
![]() | RHEL 5 : glibc (RHSA-2012:0126) | 14 Feb 201200:00 | – | nessus |
![]() | Oracle Linux 5 : glibc (ELSA-2012-0126) | 12 Jul 201300:00 | – | nessus |
![]() | Oracle Linux 4 : glibc (ELSA-2012-0125) | 12 Jul 201300:00 | – | nessus |
![]() | Scientific Linux Security Update : glibc on SL4.x i386/x86_64 (20120213) | 1 Aug 201200:00 | – | nessus |
![]() | CentOS 4 : glibc (CESA-2012:0125) | 14 Feb 201200:00 | – | nessus |
![]() | RHEL 4 : glibc (RHSA-2012:0125) | 14 Feb 201200:00 | – | nessus |
![]() | Amazon Linux AMI : glibc (ALAS-2012-39) | 4 Sep 201300:00 | – | nessus |
![]() | RHEL 6 : glibc (RHSA-2012:0058) | 25 Jan 201200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | i386 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.i386.rpm |
RedHat | 5 | i686 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.i686.rpm |
RedHat | 5 | ia64 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.ia64.rpm |
RedHat | 5 | ppc | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.ppc.rpm |
RedHat | 5 | ppc64 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.ppc64.rpm |
RedHat | 5 | s390 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.s390.rpm |
RedHat | 5 | s390x | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.s390x.rpm |
RedHat | 5 | x86_64 | glibc | 2.5-65.el5_7.3 | glibc-2.5-65.el5_7.3.x86_64.rpm |
RedHat | 5 | i386 | glibc-common | 2.5-65.el5_7.3 | glibc-common-2.5-65.el5_7.3.i386.rpm |
RedHat | 5 | ia64 | glibc-common | 2.5-65.el5_7.3 | glibc-common-2.5-65.el5_7.3.ia64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo