[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 44042 Download | Alert*

Red Hat offers support and services for each major release of Red Hat Enterprise Linux throughout four phases - Full Support, Maintenance 1 and 2, and the Extended Life Phase. For Red Hat Enterprise Linux 6, the Full/Maintenance Phases span 10 years, followed by an Extended Life Phase. Together, these four phases constitute the life cycle. Red Hat Enterprise Linux 6-based products will transition ...

A flaw in how tomboy handles LD_LIBRARY_PATH was discovered where by appending paths to LD_LIBRARY_PATH the program would also search the current directory for shared libraries. In directories containing network data, those libraries could be injected into the application. The updated packages have been patched to correct this issue.

A vulnerability was found in gnome-screensaver 2.20.0 that could possibly allow a local user to read the clipboard contents and X selection data for a locked session by using CTRL-V . The updated packages have been patched to correct this issue.

The GNOME Display Manager is a configurable re-implementation of XDM, the X Display Manager. GDM allows you to log in to your system with the X Window System running, and supports running several different X sessions on your local machine at the same time. A flaw was found in the way the gdm package was built. The gdm package was missing TCP wrappers support on 64-bit platforms, which could resul ...

Luigi Auriemma found a few programming errors in Pulseaudio, that can be used to crash the Pulseaudio daemon, by authenticated and unauthenticated users. The updated packages fix these issues.

A vulnerability has been found and corrected in imlib2: imlib2 before 1.4.2 allows context-dependent attackers to have an unspecified impact via a crafted ARGB, BMP, JPEG, LBM, PNM, TGA, or XPM file, related to several heap and stack based buffer overflows - partly due to integer overflows. Packages for 2008.0 and 2009.0 are provided as of the Extended Maintenance Program

Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current eog working directory . This update provides fix for that vulnerability.

Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current dia working directory . This update provides fix for that vulnerability.

Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current dia working directory . This update provides fix for that vulnerability. Update: Packages for 2008.0 are being provided due to extended support for Corpor ...

Python has a variable called sys.path that contains all paths where Python loads modules by using import scripting procedure. A wrong handling of that variable enables local attackers to execute arbitrary code via Python scripting in the current Blender working directory . This update provides fix for that vulnerability. Update: Packages for 2008.0 are being provided due to extended support for Co ...


Pages:      Start    4235    4236    4237    4238    4239    4240    4241    4242    4243    4244    4245    4246    4247    4248    ..   4404

© SecPod Technologies