Page 1025 of 5206 results (0.011 seconds)

CVSS: 2.1EPSS: 0%CPEs: 23EXPL: 2

Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface. El kernel de Linux 2.2x permite a usuarios locales causar una denegación de servicio (caída) usando la función nmap() con un parámetro PROT_READ para acceder páginas de memoria no legibles mediante el interfaz /proc/pid/mem. • https://www.exploit-db.com/exploits/22105 http://www.debian.org/security/2003/dsa-336 http://www.linuxsecurity.com/advisories/engarde_advisory-2976.html http://www.mandrakesoft.com/security/advisories?name=MDKSA-2003:039 http://www.redhat.com/support/errata/RHSA-2003-088.html http://www.securityfocus.com/bid/6420 http://www.trustix.net/errata/misc/2002/TSL-2002-0083-kernel.asc.txt https://exchange.xforce.ibmcloud.com/vulnerabilities/10884 https://access.redhat.com/security/cve/C •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs. El kernel de Linux 2.4.20 y anteriores, y 2.5.x, cuando se ejecuta en sistemas x86, permite a usuarios locales causar una denegación de servicio (cuelgue) mediante el modo de emulación, que no borra adecuadamente los marcadores (flags) TF y NT EFLAGs. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000553 http://marc.info/?l=bugtraq&m=103714004623587&w=2 http://marc.info/?l=bugtraq&m=103737292709297&w=2 http://rhn.redhat.com/errata/RHSA-2002-262.html http://rhn.redhat.com/errata/RHSA-2002-264.html http://www.redhat.com/support/errata/RHSA-2002-263.html http://www.securityfocus.com/bid/6115 https://exchange.xforce.ibmcloud.com/vulnerabilities/10576 https://access.redhat.com/security/cve/CVE-2002-1319 h •

CVSS: 3.6EPSS: 0%CPEs: 1EXPL: 0

The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall). • http://marc.info/?l=bugtraq&m=101561298818888&w=2 http://www.debian.org/security/2003/dsa-311 http://www.debian.org/security/2003/dsa-312 http://www.debian.org/security/2003/dsa-332 http://www.debian.org/security/2003/dsa-336 http://www.debian.org/security/2004/dsa-442 http://www.iss.net/security_center/static/8420.php http://www.openwall.com/linux http://www.redhat.com/support/errata/RHSA-2002-158.html http://www.securityfocus.com/bid/4259 •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 0

The Network Address Translation (NAT) capability for Netfilter ("iptables") 1.2.6a and earlier leaks translated IP addresses in ICMP error messages. • http://marc.info/?l=bugtraq&m=102088521517722&w=2 http://online.securityfocus.com/advisories/4116 http://www.iss.net/security_center/static/9043.php http://www.linux-mandrake.com/en/security/2002/MDKSA-2002-030.php http://www.redhat.com/support/errata/RHSA-2002-086.html http://www.securityfocus.com/bid/4699 • CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer •

CVSS: 2.1EPSS: 0%CPEs: 42EXPL: 2

The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories. • https://www.exploit-db.com/exploits/21353 http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0074.html http://www.cs.helsinki.fi/linux/linux-kernel/2002-13/0054.html http://www.iss.net/security_center/static/8634.php http://www.securityfocus.com/archive/1/264117 http://www.securityfocus.com/bid/4367 •