Page 23 of 227 results (0.002 seconds)

CVSS: 4.9EPSS: 0%CPEs: 14EXPL: 1

19 Aug 2019 — An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver. Se descubrió un problema en el kernel de Linux versiones anteriores a 5.1.17. Se presenta una desreferencia del puntero NULL causada por un dispositivo USB malicioso en el controlador sound/usb/line6/pcm.c. A NULL pointer dereference flaw was found in the way the LINE6 drivers in the Linux kernel allocated buffers for USB packets. • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •

CVSS: 4.9EPSS: 0%CPEs: 9EXPL: 1

19 Aug 2019 — An issue was discovered in the Linux kernel before 5.2.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/helper.c (motu_microbookii) driver. Se descubrió un problema en el kernel de Linux versiones anteriores a 5.2.8. Se presenta una desreferencia del puntero NULL causada por un dispositivo USB malicioso en el controlador sound/usb/helper.c (motu_microbookii). An update that solves 38 vulnerabilities and has 159 fixes is now available. • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html • CWE-476: NULL Pointer Dereference •

CVSS: 4.9EPSS: 0%CPEs: 9EXPL: 1

19 Aug 2019 — An issue was discovered in the Linux kernel before 5.1.8. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/driver.c driver. Se descubrió un problema en el kernel de Linux versiones anteriores a 5.1.8. Se presenta una desreferencia del puntero NULL causada por un dispositivo USB malicioso en el controlador sound/usb/line6/driver.c. A NULL pointer dereference flaw was found in the way the Line 6 POD USB driver in the Linux kernel handled disconnection. • http://www.openwall.com/lists/oss-security/2019/08/20/2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 18EXPL: 0

16 Aug 2019 — check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion. La función check_input_term en el archivo sound/usb/mixer.c en el kernel de Linux versiones hasta 5.2.9, maneja inapropiadamente la recursión, conllevando al agotamiento de la pila del kernel. It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not did not handle detach operations correctly, leading to a use-after-free vulnerability. A physically proximate att... • http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html • CWE-674: Uncontrolled Recursion •

CVSS: 7.5EPSS: 0%CPEs: 30EXPL: 0

19 Jul 2019 — A flaw was found in the Linux kernel's NFS implementation, all versions 3.x and all versions 4.x up to 4.20. An attacker, who is able to mount an exported NFS filesystem, is able to trigger a null pointer dereference by using an invalid NFS sequence. This can panic the machine and deny access to the NFS server. Any outstanding disk writes to the NFS server will be lost. Se detectó un fallo en la implementación de NFS del kernel de Linux, todas las versiones 3.x y todas las versiones 4.x hasta 4.20. • https://access.redhat.com/errata/RHSA-2019:2696 • CWE-476: NULL Pointer Dereference •

CVSS: 7.8EPSS: 79%CPEs: 43EXPL: 30

16 Jul 2019 — In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect mar... • https://packetstorm.news/files/id/165051 • CWE-271: Privilege Dropping / Lowering Errors •

CVSS: 8.8EPSS: 2%CPEs: 4EXPL: 0

19 May 2017 — The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled. El servidor en Dropbear anteriores a 2017.75 podría permitir la post-autenticación de ejecución de código remoto con privilegios de root debido a una doble liberación en la limpieza de los TCP listeners cuando la opción -a está habilitada. Two vulnerabilities were found in Dropbear, a lightweight SSH2 server and client. • http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html • CWE-415: Double Free •