This is an automatically created tracking bug! It was created to ensure that one or more security vulnerabilities are fixed in affected versions of fedora-all. For comments that are specific to the vulnerability please use bugs filed against the “Security Response” product referenced in the “Blocks” field.
Source link
[Bug 1847354] CVE-2020-10766 kernel: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. [fedora-all]
RELATED STORIES
OpenSSH 8.5 was released on 2021-03-03. It is available from the
mirrors listed at https://www.openssh.com/.
...
Energy or commodity trading and risk management (ETRM or CTRM) systems have been gaining momentum...
# Exploit Title: Covid-19 Contact Tracing System 1.0 - Remote Code Execution (Unauthenticated)
# Date:...
Week in review: Kali Linux 2021.1, CNAME-based tracking, VMware vCenter Servers under attack | IT...
‘Tis the season of giving! How have you given back to the open-source community? No...
# Exploit Title: LightCMS 1.3.4 - 'exclusive' Stored XSS
# Date: 25/02/2021
# Exploit Author:...
‘Tis the season of giving! How have you given back to the open-source community? No...
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##
...
# Exploit Title: Monica 2.19.1 - 'last_name' Stored XSS
# Date: 22-02-2021
# Exploit Author:...
Executive Summary Informations Name CVE-2020-35499 First vendor Publication 2021-02-19 Vendor Cve Last vendor Modification 2021-02-22...
You must be logged in to post a comment.