Suse Linux Enterprise Software Development Kit 11.0 Service Pack 4

CPE Details

Suse Linux Enterprise Software Development Kit 11.0 Service Pack 4
11.0
2016-04-11
12h31 +00:00
2023-06-06
10h46 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:suse:linux_enterprise_software_development_kit:11.0:sp4:*:*:*:*:*:*

Informations

Vendor

suse

Product

linux_enterprise_software_development_kit

Version

11.0

Update

sp4

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2017-1000366 2017-06-19 14h00 +00:00 glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.
7.8
Haute
CVE-2014-9761 2016-04-19 19h00 +00:00 Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
9.8
Critique
CVE-2015-7547 2016-02-18 20h00 +00:00 Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
8.1
Haute