[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251625

 
 

909

 
 

196370

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195632 Download | Alert*

The advisory is missing the security advisory description. For more information please visit the reference link

[19.11-4] - Remove MLX{4,5} glue libraries since RHEL 8 ships the correct libibverbs library. [19.11-3] - Remove /usr/share/dpdk/mk/exec-env/{bsd,linux}app symlinks [19.11-2] - Add pretrans to handle /usr/share/dpdk/mk/exec-env/{bsd,linux}app [19.11-1] - Rebase to 19.11 - Remove dpdk-pdump [18.11.2-4] - Pass the correct LDFLAGS to host apps too

dpdk: set of libraries for fast packet processing DPDK could be made to consume resources if it received specially crafted input.

The dpdk packages provide the Data Plane Development Kit, which is a set of libraries and drivers for fast packet processing in the user space. The following packages have been upgraded to a later upstream version: dpdk . Security Fix: * dpdk: possible memory leak leads to denial of service For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other ...

It was discovered that the vhost PMD in DPDK, a set of libraries for fast packet processing, was affected by memory and file descriptor leaks which could result in denial of service.

This update for dpdk to version 18.11.3 fixes the following issues: dpdk was updated to 18.11.3 Security issue fixed: - CVE-2019-14818: Fixed a memory leak vulnerability caused by a malicious container may lead to to denial of service . Other issues addressed: - Changed to multibuild . - Fixed a regression caused by loading old version drivers .

It was discovered that the vhost PMD in DPDK, a set of libraries for fast packet processing, was affected by memory and file descriptor leaks which could result in denial of service.

Cyrus IMAP 2.5.x before 2.5.14 and 3.x before 3.0.12 allows privilege escalation because an HTTP request may be interpreted in the authentication context of an unrelated previous request that arrived over the same connection.

Oracle Solaris 11 - ( CVE-2019-19203 )

Oracle Solaris 11 - ( CVE-2019-19012 )


Pages:      Start    9508    9509    9510    9511    9512    9513    9514    9515    9516    9517    9518    9519    9520    9521    ..   19563

© SecPod Technologies