Page 1019 of 5206 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges. Vulnerabilidad desconocida en la comprobación de eflags en la emulación de 32 bits del kernel de Linux para sistemas AMD64 permite a usuarios locales ganar privilegios. • http://security.gentoo.org/glsa/glsa-200402-06.xml http://www.kb.cert.org/vuls/id/337238 http://www.redhat.com/support/errata/RHSA-2004-017.html http://www.securityfocus.com/bid/9429 https://exchange.xforce.ibmcloud.com/vulnerabilities/14888 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A868 https://access.redhat.com/security/cve/CVE-2004-0001 https://bugzilla.redhat.com/show_bug.cgi?id=1617129 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking." Vulnerabilidad desconocida en el kernel de Linux anterior a 2.4.22 permite a usuarios locales ganar privilegios, relacionada con "comprobación de límites R128 DRI". • http://secunia.com/advisories/10782 http://secunia.com/advisories/10911 http://secunia.com/advisories/10912 http://secunia.com/advisories/11202 http://secunia.com/advisories/11361 http://secunia.com/advisories/11362 http://secunia.com/advisories/11369 http://secunia.com/advisories/11370 http://secunia.com/advisories/11376 http://secunia.com/advisories/11464 http://secunia.com/advisories/11891 http://secunia.com/advisories/12075 http://www.ciac.org/ciac/bulletins/o-082 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file. Antivir / Linux 2.0.9-9, y posiblemente versiones anteriores, permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en el fichero temporal .pid_antivir_$$ • http://marc.info/?l=bugtraq&m=107402026023763&w=2 http://secunia.com/advisories/10620 http://www.osvdb.org/3496 http://www.securitytracker.com/id?1008702 https://exchange.xforce.ibmcloud.com/vulnerabilities/14214 •

CVSS: 7.2EPSS: 0%CPEs: 54EXPL: 4

The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. La llamada de sistema mremap (do_mremap) en Linux kernel 2.2, 2.4 y 2.6 y posiblemente otras versiones anteriores a 2.4.24, no realiza adecuadamente comprobaciones de límites, lo que permite a usuarios locales causar una denegación de servicio y posiblemente ganar privilegios causando que se reasigne una área de memoria virtual (WMA) para crea una WMA de longitud cero, vulnerabilidad distinta a CAN-2004-0077. • https://www.exploit-db.com/exploits/141 https://www.exploit-db.com/exploits/142 https://www.exploit-db.com/exploits/145 ftp://patches.sgi.com/support/free/security/advisories/20040102-01-U http://archives.neohapsis.com/archives/bugtraq/2004-01/0070.html http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000799 http://download.immunix.org/ImmunixOS/7.3/updates/IMNX-2004-73-001-01 http://isec.pl/vulnerabilities/isec-0013-mremap.txt http://klecker.debian.org/~j •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function. • http://www.securityfocus.com/bid/8987 http://www.ussg.iu.edu/hypermail/linux/kernel/0311.0/0621.html http://www.ussg.iu.edu/hypermail/linux/kernel/0311.0/0627.html http://www.ussg.iu.edu/hypermail/linux/kernel/0311.0/0630.html •