NetBSD overflow
Posted by Erg Noor on Mar 02 Hi, Trivial overflow in hfslib_reada_node_offset, while loop has no range checks. |size_t hfslib_reada_node_offsets(void* in_bytes, uint16_t* out_offset_array) { void*...
Highlights from the New U.S. Cybersecurity Strategy
The Biden administration today issued its vision for beefing up the nation’s collective cybersecurity posture, including calls for legislation establishing liability for software products and...
USN-5916-1: Linux kernel vulnerability
Jann Horn discovered that the Linux kernel did not properly track memory allocations for anonymous VMA mappings in some situations, leading to potential data structure...
USN-5915-1: Linux kernel (OEM) vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
USN-5914-1: Linux kernel (OEM) vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
USN-5913-1: Linux kernel (OEM) vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
DSA-5368 libreswan – security update
It was discovered that the libreswan IPsec implementation could be forced into a crash/restart via malformed IKEv2 packets after peer authentication, resulting in denial of...
USN-5912-1: Linux kernel vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
USN-5911-1: Linux kernel vulnerabilities
It was discovered that the Upper Level Protocol (ULP) subsystem in the Linux kernel did not properly handle sockets entering the LISTEN state in certain...
IBM partners up with Cohesity for better data defense in new storage suite
Data security and protection are the main upside for IBM’s upcoming storage offering, which combines the company’s own products with those from third parties. Read...