[Forgot Password]
Login  Register Subscribe

23631

 
 

126951

 
 

99602

 
 

909

 
 

80167

 
 

109

 
 
Paid content will be excluded from the download.

Filter
Matches : 9981 Download | Alert*

An updated kernel-uek package that fixes one security issue and multiple bugs is now available for Oracle Enterprise Linux 6. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available from the CVE link in the References section. The kernel-uek is main component of an operating system. This security update re-applies the fix for CVE-2013-4470 and CVE-201 ...

The Linux kernel before 3.12, when UDP Fragmentation Offload is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel"s TCP/IP protocol suite implementation handled IPv6 sockets that used the UDP_CORK option. A local, unprivileged user could use this flaw to cause a denial of service. * An information leak flaw was found in the way Linux kernel"s device mapper subsystem, under cert ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel handled the creation of temporary IPv6 addresses. If the IPv6 privacy extension was enabled , an attacker on the local network could disable IPv6 temporary address generation, leading to a potential information disclosure. * An information leak flaw was found in the ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel"s TCP/IP protocol suite implementation handled IPv6 sockets that used the UDP_CORK option. A local, unprivileged user could use this flaw to cause a denial of service. * An information leak flaw was found in the way Linux kernel"s device mapper subsystem, under cert ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel handled the creation of temporary IPv6 addresses. If the IPv6 privacy extension was enabled , an attacker on the local network could disable IPv6 temporary address generation, leading to a potential information disclosure. * An information leak flaw was found in the ...

Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. A buffer overflow flaw was found in the way Ruby parsed floating point numbers from their text representation. If an application using Ruby accepted untrusted input strings and converted them to floating point numbers, an attacker able to provide su ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * An information leak flaw was found in the way the Linux kernel"s device mapper subsystem, under certain conditions, interpreted data written to snapshot block devices. An attacker could use this flaw to read data from disk blocks in free space, which are normally inaccessible. Red Hat would like to thank Fujit ...

linux-lts-raring: Linux hardware enablement kernel from Raring Several security issues were fixed in the kernel.

linux: Linux kernel Several security issues were fixed in the kernel.


Pages:      Start    3    4    5    6    7    8    9    10    11    12    13    14    15    16    ..   998

© 2013 SecPod Technologies