Page 1004 of 5206 results (0.011 seconds)

CVSS: 6.2EPSS: 0%CPEs: 280EXPL: 0

Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647 https://access.redhat.com/security/cve/CVE-2005-0178 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%4041e2bfbeOiXFga62XrBhzm7Kv9QDmQ http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10298 https://access.redhat.com/security/cve/CVE-2005-0177 https://bugzilla.redhat.com/show_bug.cgi? • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.1EPSS: 1%CPEs: 9EXPL: 0

The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945 http://oss.sgi.com/archives/netdev/2005-01/msg01036.html http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://secunia.com/advisories/19607 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/security/2006/dsa-1018 http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 http://www.novell. • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://secunia.com/advisories/19607 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-472.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1225 https& •

CVSS: 3.6EPSS: 0%CPEs: 46EXPL: 1

Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html http://secunia.com/advisories/17826 http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/archive/1/386374 http://www.securityfocus.com/bid/12198 https://oval.cisecurity.org/re •