[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

253741

 
 

909

 
 

197391

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 11614 Download | Alert*

rpcbind: converts RPC program numbers into universal addresses Details: USN-4986-1 fixed a vulnerability in rpcbind. The update caused a regression resulting in rpcbind crashing in certain environments. This update fixes the problem. We apologize for the inconvenience. Original advisory USN-4986-1 caused a regression in rpcbind.

gnome-autoar: Archive integration support for GNOME Details: USN-4937-1 fixed a vulnerability in GNOME Autoar. The update caused a regression when extracting certain archives. This update fixes the problem. Original advisory USN-4937-1 introduced a regression in GNOME Autoar.

isc-dhcp: DHCP server and client Details: USN-4969-1 fixed a vulnerability in DHCP. The package for Ubuntu 21.04 introduced a regression causing it to reject certain valid configuration files. This update fixes the problem. We apologize for the inconvenience. Original advisory USN-4969-1 introduced a regression in DHCP.

lxc: Linux Containers userspace tools LXC would allow unintended access.

tcmu: TCM-Userspace backend tcmu could be made to crash if it received specially crafted input.

network-manager: Network connection manager NetworkManager would allow unintended access to files and modem device configuration.

ruby-rack-cors: provides support for Cross-Origin Resource Sharing for Rack compatible web applications rack-cors would allow unintended access to files over the network.

flightgear: Flight Gear Flight Simulator FlightGear could be made to crash if it received specially crafted input.

William Grant discovered that dpkg-source did not safely apply diffs when unpacking source packages. If a user or an automated system were tricked into unpacking a specially crafted source package, a remote attacker could modify files outside the target unpack directory, leading to a denial of service or potentially gaining access to the system.

It was discovered that AWStats did not correctly filter the LoadPlugin configuration option. A local attacker on a shared system could use this to inject arbitrary code into AWStats.


Pages:      Start    1109    1110    1111    1112    1113    1114    1115    1116    1117    1118    1119    1120    1121    1122    ..   1161

© SecPod Technologies