[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250363

 
 

909

 
 

196124

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195386 Download | Alert*

Guenal Davalan reported a flaw in x11vnc, a VNC server to allow remote access to an existing X session. x11vnc creates shared memory segments with 0777 mode. A local attacker can take advantage of this flaw for information disclosure, denial of service or interfering with the VNC session of another user on the host.

The spice-vdagent packages provide a SPICE agent for Linux guests. Security Fix: * spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map * spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition * spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table * spice-vdagent: possibility to exhaust file des ...

The spice-vdagent packages provide a SPICE agent for Linux guests.

[0.20.0-3] - Fix mouse problems in multi-monitor environments under Wayland Resolves: rhbz#1790904 rhbz#1824610 [0.20.0-2] - Resolves: CVE-2020-25650, CVE-2020-25651, CVE-2020-25652, CVE-2020-25653

spice-vdagent: Spice agent for Linux Several security issues were fixed in SPICE vdagent.

The spice-vdagent packages provide a SPICE agent for Linux guests. Security Fix: * spice-vdagent: possible file transfer DoS and information leak via active_xfers hash map * spice-vdagent: UNIX domain socket peer PID retrieved via SO_PEERCRED is subject to race condition * spice-vdagent: memory DoS via arbitrary entries in active_xfers hash table * spice-vdagent: possibility to exhaust file des ...

This update for spice-vdagent fixes the following issues: - Update to version 0.21.0 - CVE-2020-25650: memory DoS via arbitrary entries in `active_xfers` hash table - CVE-2020-25651: possible file transfer DoS and information leak via `active_xfers` hash map - CVE-2020-25652: possibility to exhaust file descriptors in `vdagentd` - CVE-2020-25653: UNIX domain socket peer PID retrieved via `SO_PE ...

An incomplete fix for CVE-2020-12662 was shipped for Unbound in Red Hat Enterprise Linux 7, as part of erratum RHSA-2020-2414 . Vulnerable versions of Unbound could still amplify an incoming query into a large number of queries directed to a target, even with a lower amplification ratio compared to versions of Unbound that shipped before the mentioned erratum. This issue is about the incomplete fi ...

The unbound packages provide a validating, recursive, and caching DNS or DNSSEC resolver. Security Fix: * unbound: incomplete fix for CVE-2020-12662 in RHEL7 For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.

The advisory is missing the security advisory description. For more information please visit the reference link


Pages:      Start    9431    9432    9433    9434    9435    9436    9437    9438    9439    9440    9441    9442    9443    9444    ..   19538

© SecPod Technologies