[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 194475 Download | Alert*

This update for systemd fixes the following issues: - CVE-2021-33910: Fixed a denial of service in systemd via unit_name_path_escape - Skip udev rules if "elevator=" is used Special Instructions and Notes: Please reboot the system after installing this update.

This update for systemd fixes the following issues: - CVE-2021-33910: Fixed use of strdupa on a path . - logind: terminate cleanly on SIGTERM/SIGINT . - Adopting BFQ to control I/O . - Rules weren"t applied to dm devices . - Ignore obsolete elevator kernel parameter . - Make sure the versions of both udev and systemd packages are always the same . - Avoid error message when udev is updated due to ...

Redis is an in-memory database that persists on disk. A vulnerability involving out-of-bounds read and integer overflow to buffer overflow exists starting with version 2.2 and prior to versions 5.0.13, 6.0.15, and 6.2.5. On 32-bit systems, Redis `*BIT*` command are vulnerable to integer overflow that can potentially be exploited to corrupt the heap, leak arbitrary heap contents or trigger remote c ...

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. This new Engine supports Multi-threading, Automatic Protocol Detection , Gzip Decompression, Fast IP Matching, and GeoIP identification.

The Suricata Engine is an Open Source Next Generation Intrusion Detection and Prevention Engine. This engine is not intended to just replace or emulate the existing tools in the industry, but will bring new ideas and technologies to the field. This new Engine supports Multi-threading, Automatic Protocol Detection , Gzip Decompression, Fast IP Matching, and GeoIP identification.

cjose [0.6.1-2] - fix concatkdf big endian architecture problem. Upstream issue #77. [0.6.1-1] - upgrade to latest upstream 0.6.1 [0.5.1-3] - Rebuilt for https://fedoraproject.org/wiki/Fedora_29_Mass_Rebuild [0.5.1-2] - Rebuilt for https://fedoraproject.org/wiki/Fedora_28_Mass_Rebuild [0.5.1-1] - Initial packaging mod_auth_openidc [2.3.7-11] - Resolves: rhbz#1987222 - CVE-2021-32792 XSS when using ...

The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server. Security Fix: * mod_auth_openidc: open redirect in oidc_validate_redirect_url * mod_auth_openidc: hardcoded static IV and AAD with a reused key in AES GCM encryption * mod_auth_openidc: XSS when us ...

The mod_auth_openidc is an OpenID Connect authentication module for Apache HTTP Server. It enables an Apache HTTP Server to operate as an OpenID Connect Relying Party and/or OAuth 2.0 Resource Server.

In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193

This update for fetchmail fixes the following issues: - CVE-2021-36386: Fixed a missing variable initialization that can cause read from bad memory locations. - Change PASSWORDLEN from 64 to 256


Pages:      Start    9382    9383    9384    9385    9386    9387    9388    9389    9390    9391    9392    9393    9394    9395    ..   19447

© SecPod Technologies