[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 196097 Download | Alert*

[20120801-253.0.1.el8_1] - Disable _AST_no_spawnveg for taskset workaround [Orabug: 26754277] Red Hat Bug: #1295563 [20120801-253] - Do not evaluate arithmetic expressions from environment variables at startup Resolves: #1790546

A denial of service flaw was found in the way BIND handled DNSSEC validation.A remote attacker could use this flaw to make named exit unexpectedly with anassertion failure via a specially crafted DNS response

Python debugger accessible to authorized users:A flaw was found in the way hg serve --stdio command in Mercurial handled command-line options. A remote, authenticated attacker could use this flaw to execute arbitrary code on the Mercurial server by using specially crafted command-line options

It was found that libuser, as used in the chfn userhelper functionality, does not properly filter out newline characters, which allows an authenticated local attacker to corrupt the /etc/passwd file and cause denial-of-service against the system. A flaw was found in the way the libuser library handled the /etc/passwd file. A local attacker could use an application compiled against libuser to mani ...

It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman. It was found that mailman stored private email messages in a world-readable directory. A local user could use this flaw to read private mailing list archives

It was found that program-based automounter maps that used interpreted languages such as Python would use standard environment variables to locate and load modules of those languages. A local attacker could potentially use this flaw to escalate their privileges on the system.

It was found that GnuTLS did not check activation and expiration dates of CA certificates. This could cause an application using GnuTLS to incorrectly accept a certificate as valid when its issuing CA is already expired. It was found that GnuTLS did not verify whether a hashing algorithm listed in a signature matched the hashing algorithm listed in the certificate. An attacker could create a certi ...

A stack-based buffer overflow was found in the way the FreeRADIUS rlm_pap module handled long password hashes. An attacker able to make radiusd process a malformed password hash could cause the daemon to crash.

Mailman is a program used to help manage email discussion lists. It was found that mailman did not sanitize the list name before passing it to certain MTAs. A local attacker could use this flaw to execute arbitrary code as the user running mailman. This update also fixes the following bugs: * Previously, it was impossible to configure Mailman in a way that Domain-based Message Authentication, Rep ...

Moderate: Oracle Linux 6 autofs security and bug fix update.


Pages:      Start    11256    11257    11258    11259    11260    11261    11262    11263    11264    11265    11266    11267    11268    11269    ..   19609

© SecPod Technologies