[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 27386 Download | Alert*

linux-oem-6.1: Linux kernel for OEM systems Several security issues were fixed in the Linux kernel.

linux-gke: Linux kernel for Google Container Engine systems Several security issues were fixed in the Linux kernel.

linux-bluefield: Linux kernel for NVIDIA BlueField platforms Several security issues were fixed in the Linux kernel.

In binder_vma_close of binder.c, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254837884References: Upstream kernel

[3.10.0-1160.114.2.0.1.el7.OL7] - debug: lock down kgdb [Orabug: 34270798] {CVE-2022-21499} [3.10.0-1160.114.2.el7.OL7] - Update Oracle Linux certificates - Oracle Linux RHCK Module Signing Key was compiled into kernel - Update x509.genkey [Orabug: 24817676] - Conflict with shim-ia32 and shim-x64 = 15-2.0.9] - Update oracle value to match new certificate [3.10.0-1160.114.2.el7] - sched/membarrie ...

Security Fix: kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: nf_tables: use-after-free vulnerability in the nft_verdict_init fu ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: kernel: use-after-free in l2cap_connect and l2cap_le_connect_req in net/bluetooth/l2cap_core.c kernel: use-after-free in sch_qfq network scheduler kernel: IGB driver inadequate buffer size for frames larger than MTU kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map ...

The host is installed with Google Chrome before 124.0.6367.60 and is prone to a use-after-free vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation allows attackers to have unspecified impact.


Pages:      Start    217    218    219    220    221    222    223    224    225    226    227    228    229    230    ..   2738

© SecPod Technologies