Page 291 of 3121 results (0.016 seconds)

CVSS: 5.5EPSS: 0%CPEs: 46EXPL: 1

25 Nov 2005 — Memory leak in the VFS file lease handling in locks.c in Linux kernels 2.6.10 to 2.6.15 allows local users to cause a denial of service (memory exhaustion) via certain Samba activities that cause an fasync entry to be re-allocated by the fcntl_setlease function after the fasync queue has already been cleaned by the locks_delete_lock function. • https://www.exploit-db.com/exploits/26749 •

CVSS: 6.6EPSS: 0%CPEs: 106EXPL: 0

25 Nov 2005 — The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=bbbe80cdaf72a75a463aff9551e60b31e2f69061%3Bhp=f841bde30c18493a94fd5d522b84724a8eb82a4a%3Bhb=4ea6a8046bb49d43c950898f0cb4e1994ef6c89d%3Bf=net/ipv6/ip6_flowlabel.c • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 37EXPL: 0

23 Nov 2005 — The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges. • http://secunia.com/advisories/17786 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 2%CPEs: 37EXPL: 0

23 Nov 2005 — The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash). • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 9.1EPSS: 0%CPEs: 134EXPL: 1

20 Nov 2005 — The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. • https://www.exploit-db.com/exploits/26489 • CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

09 Nov 2005 — Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP. Condición de carrera en do_coredump en signal.c en el kernel 2.6 de Linux permite a usuarios locales causar una denegación de servicio disparando un volcado del núcleo (core dump) en un subproceso mientras otro tiene un SIGSTOP pendiente. • http://secunia.com/advisories/17917 •

CVSS: 5.5EPSS: 0%CPEs: 35EXPL: 1

27 Oct 2005 — The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash). • https://www.exploit-db.com/exploits/26382 •

CVSS: 5.5EPSS: 0%CPEs: 78EXPL: 1

25 Oct 2005 — The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command. • http://secunia.com/advisories/18523 • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 4%CPEs: 117EXPL: 0

20 Oct 2005 — The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 9.1EPSS: 1%CPEs: 25EXPL: 0

20 Oct 2005 — Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets. • http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A •