[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 43198 Download | Alert*

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A NULL pointer dereference flaw was found in the way the Linux kernel"s virtual console implementation handled reference counting when accessing pseudo-terminal device files . A local, unprivileged attacker could use this flaw to crash the system. * It was found that the Linux kernel"s ping socket implementatio ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A NULL pointer dereference flaw was found in the way the Linux kernel"s virtual console implementation handled reference counting when accessing pseudo-terminal device files . A local, unprivileged attacker could use this flaw to crash the system. * It was found that the Linux kernel"s ping socket implementatio ...

The kernel packages contain the Linux kernel, the core of any Linux operating system. * A NULL pointer dereference flaw was found in the way the Linux kernel"s virtual console implementation handled reference counting when accessing pseudo-terminal device files . A local, unprivileged attacker could use this flaw to crash the system. * It was found that the Linux kernel"s ping socket implementatio ...

linux: Linux kernel Several security issues were fixed in the kernel.

linux: Linux kernel Several security issues were fixed in the kernel.

Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security update.

Moderate: Oracle Linux 6 Unbreakable Enterprise kernel security update.

Moderate: Oracle Linux 6 Unbreakable Enterprise kernel security update.

Moderate: Oracle Linux 5 Unbreakable Enterprise kernel security update.

A buffer overflow flaw was found in the way the Linux kernel's virtio-net subsystem handled certain fraglists when the GRO (Generic Receive Offload) functionality was enabled in a bridged network configuration. An attacker on the local network could potentially use this flaw to crash the system, or, although unlikely, elevate their privileges on the system.


Pages:      Start    1235    1236    1237    1238    1239    1240    1241    1242    1243    1244    1245    1246    1247    1248    ..   4319

© SecPod Technologies