[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 82199 Download | Alert*

[32:9.11.4-26.P2.7] - Apply again patch 172, got removed by mistake [32:9.11.4-26.P2.6] - Insufficient IXFR checks could lead to assertion failure

[4.13.3-5] - resolves: #2003507 - Fix CVE-2021-20254

[2.56.4-15] - Fix test failure introduced in previous update - Related: #1971533 [2.56.4-14] - Refresh GHmac patchset - Resolves: #1971533 [2.56.4-13] - Rename and consolidate existing patches for better maintainability - Refresh CVE-2021-27219 patcheset, using better-targeted fixes Resolves: #1939108 [2.56.4-12] - Fix various problems in GMainContext Resolves: #1948988 [2.56.4-11] - Remove CHARSE ...

[3.4.4-4.el4] - Fix header parsing

[4.0.9-20] - Rebuild for fixed binutils [4.0.9-19] - Fix CVE-2020-35521 - Fix CVE-2020-35522 - Fix CVE-2020-35523 - Fix CVE-2020-35524

[32:9.11.26-6] - Use random entropy to generate unique TKEY identifiers [32:9.11.26-5] - Fix possible assertion failure isc_refcount_current == 0 in free_rbtdb

[4.1.1-98] - storage-mon: new resource agent Resolves: rhbz#1509319 [4.1.1-97] - podman: fix possible race during container creation Resolves: rhbz#1972743 [4.1.1-96] - LVM-activate: fix drop-in check to avoid re-creating drop-in Resolves: rhbz#1972035 [4.1.1-95] - lvmlockd: remove cmirrord support, as cmirrord is incompatible w/lvmlockd Resolves: rhbz#1969968 [4.1.1-94] - gcp-vpc-move-vip: add re ...

python-docs [3.6.7-2] - Bumping due to problems with modular RPM upgrade path - Resolves: rhbz#1695587 [3.6.7-1] - Modify for RHEL8 - Update to new Python version - Resolves: rhbz#1656044 python-wheel [1:0.31.1-3] - Adjusted the postun scriptlets to enable upgrading to RHEL 9 - Resolves: rhbz#1933055 [1:0.31.1-2] - Removed wheels own implementation of crypto due to FIPS concerns Resolves: rhbz#173 ...

A heap-based buffer overflow was discovered in OpenSLP in the way the slpd service processes URLs in service request messages. A remote unauthenticated attacker could register a service with a specially crafted URL that, when used during a service request message, would trigger the flaw and cause the program to crash or to remotely execute code with the privileges of the slpd service.

A flaw was found in the Dnsmasq application where a remote attacker can trigger a memory leak by sending specially crafted DHCP responses to the server. A successful attack is dependent on a specific configuration regarding the domain name set into the dnsmasq.conf file. Over time, the memory leak may cause the process to run out of memory and terminate, causing a denial of service


Pages:      Start    3242    3243    3244    3245    3246    3247    3248    3249    3250    3251    3252    3253    3254    3255    ..   8219

© SecPod Technologies