[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256288

 
 

909

 
 

199146

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 82556 Download | Alert*

[0.4.1-3] - Fix stack-based buffer overflow in read_file. Resolves: #2212467

Security update for libeconf

Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it.

Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. Security Fix: * libeconf: stack-based buffer overflow in read_file in lib/getfilecontents.c For more details about the security issue, including the impact, a CVSS score, acknowled ...

Libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it. Security Fix: * libeconf: stack-based buffer overflow in read_file in lib/getfilecontents.c For more details about the security issue, including the impact, a CVSS score, acknowled ...

This update for libeconf fixes the following issues: Update to version 0.5.2. * CVE-2023-30078, CVE-2023-32181: Fixed a stack-buffer-overflow vulnerability in "econf_writeFile" function . * CVE-2023-30079, CVE-2023-22652: Fixed a stack-buffer-overflow vulnerability in "read_file" function

libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it.

libeconf is a highly flexible and configurable library to parse and manage key=value configuration files. It reads configuration file snippets from different directories and builds the final configuration file from it.

Buffer overflow in some Intel SSD Tools software before version mdadm-4.2-rc2 may allow a privileged user to potentially enable escalation of privilege via local access. Uncontrolled resource consumption in some Intel SSD Tools software before version mdadm-4.2-rc2 may allow a priviledged user to potentially enable denial of service via local access

Security update for mdadm


Pages:      Start    2979    2980    2981    2982    2983    2984    2985    2986    2987    2988    2989    2990    2991    2992    ..   8255

© SecPod Technologies