Page 2 of 43 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 183EXPL: 0

09 Mar 2005 — Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 •

CVSS: 5.5EPSS: 0%CPEs: 112EXPL: 0

20 Jan 2005 — Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors. Vulnerabilidad desconocida en el código de filtrado de llamada al sistema en el subsistema de auditoría de Red Hat Enterprise Linux 3 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante vectores de ataque desconocidos. • http://www.redhat.com/support/errata/RHSA-2005-043.html •

CVSS: 9.1EPSS: 0%CPEs: 57EXPL: 0

20 Jan 2005 — Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code. Vulnerabilidad desconocida en los kernel de Linux anteriores a 2.4.23 sobre las arquitecturas AMD64 Y EMT64, asociada con "establecimiento de límites TSS", permite a usuarios locales causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección. • http://linux.bkbits.net:8080/linux-2.6/cset%403fad673ber4GuU7iWppydzNIyLntEQ •

CVSS: 9.1EPSS: 0%CPEs: 97EXPL: 0

20 Jan 2005 — The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. El soporte de ELF de 64 bits en los kernel de Linux 2.6 anteriores a 2.6.10 en arquitecturas de 64 bits no verifica adecuadamente solapamientos en asignaciones de memoria VMA (virtual memory address), lo que permite a u... • http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw •

CVSS: 7.0EPSS: 0%CPEs: 147EXPL: 4

20 Jan 2005 — Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://www.exploit-db.com/exploits/778 •

CVSS: 7.0EPSS: 0%CPEs: 53EXPL: 0

19 Jan 2005 — Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVSS: 5.5EPSS: 0%CPEs: 104EXPL: 2

15 Dec 2004 — Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/690 •

CVSS: 5.5EPSS: 0%CPEs: 104EXPL: 1

15 Dec 2004 — Integer overflow in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (kernel crash) via a cmsg_len that contains a -1, which leads to a buffer overflow. • http://marc.info/?l=bugtraq&m=110383108211524&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 104EXPL: 2

15 Dec 2004 — Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function. • https://www.exploit-db.com/exploits/692 •

CVSS: 9.1EPSS: 0%CPEs: 123EXPL: 0

01 Dec 2004 — The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code. El cargador binfmt_elf (binfmt_elf.c) del kernel de Linux 2.4.x hasta 2.4.27, y 2.6.x a 2.6.8 puede crear una cadena de nombre de intérprete sin terminador nulo, lo q... • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •