[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253164

 
 

909

 
 

197077

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196303 Download | Alert*

The iconv program in the GNU C Library 2.31 and earlier, when invoked with multiple suffixes in the destination encoding along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service. A flaw was found in glibc. When processing input in the EUC-KR encoding, an invalid input sequence could cause glibc to read beyond the end of ...

An integer overflow flaw was found in glibc that may result in reading of arbitrary memory when wordexp is used with a specially crafted untrusted regular expression input

A stack based buffer-overflow vulnerability was found in the deprecated compatibility function svcunix_create in the sunrpc's svc_unix.c module of the GNU C Library through 2.34. This vulnerability copies its path argument onto the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or then it will lead to arbitrary code execut ...

A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system

The glibc packages provide the standard C libraries , POSIX thread libraries , standard math libraries , and the name service cache daemon used by multiple programs on the system. Without these libraries, the Linux system cannot function correctly. Security Fix: * glibc: buffer over-read in iconv when processing invalid multi-byte input sequences in the EUC-KR encoding * glibc: stack corruption ...

The advisory is missing the security advisory description. For more information please visit the reference link

[2.28-164.0.5.3] - Merge external errata patches. - Siddhesh Poyarekar siddhesh at redhat.com - 2.28-164.3 - CVE-2021-3999: getcwd: align stack on clone in aarch64 and fix a memory leak - Siddhesh Poyarekar siddhesh at redhat.com - 2.28-164.2 - CVE-2022-23218, CVE-2022-23219: Fix buffer overflows in sunrpc clnt_create for quot;unix and svcunix_create . - Siddhesh Poyarekar siddhesh at redhat.com ...

The advisory is missing the security advisory description. For more information please visit the reference link

[2.17-325.0.3] - OraBug 33968985 Security Patches This release fixes CVE-2022-23219, CVE-2022-23218, and CVE-2021-3999 Reviewed-by: Jose E. Marchesi lt; jose.marchesi at oracle.com gt;

[2.17-325.0.3.ksplice1] - Latest Ksplice-aware release. [2.17-325.0.3] - OraBug 33968985 Security Patches This release fixes CVE-2022-23219, CVE-2022-23218, and CVE-2021-3999 Reviewed-by: Jose E. Marchesi


Pages:      Start    9255    9256    9257    9258    9259    9260    9261    9262    9263    9264    9265    9266    9267    9268    ..   19630

© SecPod Technologies