Page 1020 of 5206 results (0.012 seconds)

CVSS: 1.7EPSS: 0%CPEs: 42EXPL: 0

Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service. • http://linux.bkbits.net:8080/linux-2.4/cset%403fdd54b3u9Eq0Wny2Nn1HGfI3pofOQ http://linux.bkbits.net:8080/linux-2.6/cset%403ffcf122S7e3xPZCpibrXq6KRRjwqw http://www.redhat.com/support/errata/RHSA-2004-017.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9707 https://access.redhat.com/security/cve/CVE-2003-0986 https://bugzilla.redhat.com/show_bug.cgi?id=1617116 •

CVSS: 2.6EPSS: 0%CPEs: 1EXPL: 0

Multiple race conditions in the handling of O_DIRECT in Linux kernel prior to version 2.4.22 could cause stale data to be returned from the disk when handling sparse files, or cause incorrect data to be returned when a file is truncated as it is being read, which might allow local users to obtain sensitive data that was originally owned by other users, a different vulnerability than CVE-2003-0018. • http://linux.bkbits.net:8080/linux-2.4/cset%403ef33d95ym_22QH2xwhDMt264M55Fg https://exchange.xforce.ibmcloud.com/vulnerabilities/42942 •

CVSS: 10.0EPSS: 0%CPEs: 48EXPL: 0

Multiple integer overflows in the 32bit emulation for AMD64 architectures in Linux 2.4 kernel before 2.4.21 allows attackers to cause a denial of service or gain root privileges via unspecified vectors that trigger copy_from_user function calls with improper length arguments. • http://linux.bkbits.net:8080/linux-2.4/cset%403ed382f7UfJ9Q2LKCJq1Tc5B7-EC5A https://exchange.xforce.ibmcloud.com/vulnerabilities/43072 •

CVSS: 4.6EPSS: 0%CPEs: 53EXPL: 0

Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space. Las rutinas de reloj de tiempo real (RTC - real time clock) en Linux kernel 2.4.23 y anteriores no inicializan adecuadamente sus estructuras, lo que podría filtrar datos del kernel en espacio de usuario. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000799 http://marc.info/?l=bugtraq&m=107394143105081&w=2 http://secunia.com/advisories/10533 http://secunia.com/advisories/10536 http://secunia.com/advisories/10537 http://secunia.com/advisories/10538 http://secunia.com/advisories/10555 http://secunia.com/advisories/10582 http://secunia.com/advisories/10583 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 2

Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges. Un "error en comprobaciones de límites" en la función do_brk del kernel de Linux 2.4.22 y anteriores permite a usuarios locales ganar privilegios de root. • https://www.exploit-db.com/exploits/131 https://www.exploit-db.com/exploits/129 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000796 http://isec.pl/papers/linux_kernel_do_brk.pdf http://marc.info/?l=bugtraq&m=107064798706473&w=2 http://marc.info/?l=bugtraq&m=107064830206816&w=2 http://marc.info/?l=bugtraq&m=107394143105081&w=2 http://secunia.com/advisories/10328 http://secunia.com/advisories/10329 http://secunia.com/advisories/10330 http:/&#x •