[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252588

 
 

909

 
 

196930

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:600853
Rafal Wojtczuk from Bromium discovered that FreeBSD wasn"t handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users.

oval:org.secpod.oval:def:600675
Buffer overflow in the "linux emulation" support in FreeBSD kernel allows local users to cause a denial of service and possibly execute arbitrary code by calling the bind system call with a long path for a UNIX-domain socket, which is not properly handled when the address is used by other ...

oval:org.secpod.oval:def:601382
kfreebsd-8 is installed

*CPE
cpe:/a:freebsd:kfreebsd-8

© SecPod Technologies