Page 226 of 3118 results (0.021 seconds)

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 1

07 Jun 2013 — arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit. arch/x86/kernel/cpu/perf_event_intel.c en Linux kernel hasta v3.8.9 cuando Performance Events Subsystem esta habilitado, especifica una máscara de bits correctos, lo que permite a usuarios locales provocar una denegación d... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f1923820c447e986a9da0fc6bf60c1dccdf0408e • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 1%CPEs: 55EXPL: 1

07 Jun 2013 — The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet. La función bat_socket_read en net/batman-adv/icmp_socket.c en el kernel de Linux anterior a v3.3 permite a atacantes remotos causar una denegación de servicio (consumo de memoria) o posiblemente tener otro impacto sin especificar a través de paquetes batman-adv ICMP ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5a1eeef04cc7859f34dec9b72ea1b28e4aba07c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

07 Jun 2013 — The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket. La función tcp_read_sock en net/ipv4/tcp.c del kernel de Linux antes de v2.6.34 no gestiona correctamente el consumo skb, lo que permite a usuarios locales causar una denegación de servicios (caída del sistema) a través de la llamada al sistema manipulada splice para un ... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 1

07 Jun 2013 — The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call. La función do_tkill en kernel/signal.c en el kernel de Linux anterior a v3.8.9 no inicializa cierta estructura de datos, lo que permite a usuarios locales obtener información sensible de la memoria del kernel a través de aplicaciones manipu... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-399: Resource Management Errors •

CVSS: 6.2EPSS: 0%CPEs: 6EXPL: 2

20 May 2013 — Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure. Desbordamiento de búfer basado en memoria dinámica en la función tg3_read_vpd en drivers/net/ethernet/broadcom/tg3.c en el kernel de Linux anterior a v3.8.3 que permite ... • http://cansecwest.com/slides/2013/PrivateCore%20CSW%202013.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 14

14 May 2013 — The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call. La función perf_swevent_init en kernel/events/core.c en el Kernel de Linux anterior a v3.8.9 usa un tipo de datos entero incorrecto, lo que permite a usuarios locales ganar privilegios mediante una llamada al sistema perf_event_open especialmente diseñada. Security fixes: It was found that the kerne... • https://packetstorm.news/files/id/126880 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •

CVSS: 7.8EPSS: 0%CPEs: 222EXPL: 3

03 May 2013 — kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. kernel/user_namespace.c en el kernel de Linux anterior a v3.8.9 no tiene los requisitos de capacidades adecuadas para los archivos uid_map y gid_map, lo que permite a usuarios locales obtener privilegios mediante la aper... • https://www.exploit-db.com/exploits/25450 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 2%CPEs: 29EXPL: 0

03 May 2013 — The veth (aka virtual Ethernet) driver in the Linux kernel before 2.6.34 does not properly manage skbs during congestion, which allows remote attackers to cause a denial of service (system crash) by leveraging lack of skb consumption in conjunction with a double-free error. El driver Veth (también conocido como Ethernet virtual) en el kernel Linux anterior a v2.6.34 no gestiona adecuadamente skbs durante la congestión, lo que permite a atacantes remotos provocar una denegación de servicio (caída del sistema... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

03 May 2013 — The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. La función scm_set_cred en include/net/scm.h en el Kernel de Linux anterior a v3.8.11 usa valores uid y gid incorrectos durante el pase de credenciales, lo que permite a usuarios locales ganar privilegios mediante una aplicación especialmente diseñada Security fixes: It was found that the kernel-r... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=83f1b4ba917db5dc5a061a44b3403ddb6e783494 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 196EXPL: 0

29 Apr 2013 — The do_video_set_spu_palette function in fs/compat_ioctl.c in the Linux kernel before 3.6.5 on unspecified architectures lacks a certain error check, which might allow local users to obtain sensitive information from kernel stack memory via a crafted VIDEO_SET_SPU_PALETTE ioctl call on a /dev/dvb device. La función do_video_set_spu_palette en fs/compat_ioctl.c del kernel de Linux antes de v3.6.5 en arquitecturas sin especificar carece de un control de errores, per puede permitir a usuarios locales obtener i... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12176503366885edd542389eed3aaf94be163fdb • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •