[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:89002376
This update for glibc fixes the following issues: Security issue fixed: - CVE-2018-11236: Fix 32bit arch integer overflow in stdlib/canonicalize.c when processing very long pathname arguments . Bug fixes: - bsc#1086690: Fix crash in resolver on memory allocation failure. - bsc#1077763: Fix allocatio ...

oval:org.secpod.oval:def:89002186
This update for glibc fixes the following issues: - CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary - CVE-2018-11236: Fix overflow in path length computation - CVE-2018-11237: Don"t write beyond buffer destination in __mempcpy_avx512_no_vzeroupper Non security bugs fixed: - Fix ...

oval:org.secpod.oval:def:89043999
This update for glibc fixes the following issues: - CVE-2017-18269: Fix SSE2 memmove issue when crossing 2GB boundary - CVE-2018-11236: Fix overflow in path length computation - CVE-2018-11237: Don"t write beyond buffer destination in __mempcpy_avx512_no_vzeroupper Non security bugs fixed: - Fix ...

oval:org.secpod.oval:def:1902180
stdlib/canonicalize.c in the GNU C Library 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.

oval:org.secpod.oval:def:89049753
This update for glibc fixes the following security issues: - CVE-2017-18269: An SSE2-optimized memmove implementation for i386 did not correctly perform the overlapping memory check if the source memory range spaned the middle of the address space, resulting in corrupt data being produced by the cop ...

oval:org.secpod.oval:def:1700062
stdlib/canonicalize.c in the GNU C Library 2.27 and earlier, when processing very long pathname arguments to the realpath function, could encounter an integer overflow on 32-bit architectures, leading to a stack-based buffer overflow and, potentially, arbitrary code execution.The GNU C Library bef ...

oval:org.secpod.oval:def:1600962
A buffer overflow has been discovered in the GNU C Library in the __mempcpy_avx512_no_vzeroupper function when particular conditions are met. An attacker could use this vulnerability to cause a denial of service or potentially execute code.elf/dl-load.c in the GNU C Library 2.19 through 2.26 misha ...

oval:org.secpod.oval:def:1504003
[2.17-260.0.9] - Regenerate plural.c - OraBug 28806294. - Reviewed-by: Jose E. Marchesi [2.17-260.0.7] - intl: Port to Bison 3.0 - Backport of upstream gettext commit 19f23e290a5e4a82b9edf9f5a4f8ab6192871be9 - OraBug 28806294. - Reviewed-by: Patrick McGehearty [2.17-260.0.5] - Fix dbl-64/wordsize-64 ...

oval:org.secpod.oval:def:705535
glibc: GNU C Library Several security issues were fixed in GNU C Library.

oval:org.secpod.oval:def:204912
The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix: * glibc: Incorrect handling of RPATH ...

oval:org.secpod.oval:def:115085
The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets ...

oval:org.secpod.oval:def:502388
The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix: * glibc: Incorrect handling of RPATH ...

oval:org.secpod.oval:def:64175
glibc: GNU C Library Several security issues were fixed in GNU C Library.

CPE    4
cpe:/a:gnu:glibc
cpe:/o:redhat:enterprise_linux_server:7.0
cpe:/o:redhat:enterprise_linux_workstation:7.0
cpe:/o:redhat:enterprise_linux_desktop:7.0
...
CWE    1
CWE-787
*CVE
CVE-2018-11236

© SecPod Technologies