Page 291 of 2928 results (0.092 seconds)

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 2

31 Oct 2013 — The skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel through 3.12 allows remote attackers to cause a denial of service (infinite loop) via a small value in the IHL field of a packet with IPIP encapsulation. La función skb_flow_dissect en net/core/flow_dissector.c en el kernel de Linux hasta la versión 3.12 permite a atacantes remotos provocar una denegación de servicio (bucle infinito) a través de un pequeño valor en el campo IHL de un paquete con encapsulación IPIP. The kernel-rt ... • https://github.com/bl4ck5un/cve-2013-4348 • CWE-399: Resource Management Errors CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 6.0EPSS: 0%CPEs: 266EXPL: 2

17 Oct 2013 — Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device. Conflicto de interpretación en drivers/md/dm-snap-persistent.c en el kernel de Linux hasta 3.11.6 permite a usuarios remotamente autenticados obtener información sensible o modificar datos a través de un mapeado manipulado a un dispositivo de capturas de bloque. The kernel packages cont... • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9c6a182649f4259db704ae15a91ac820e63b0ca • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 2%CPEs: 265EXPL: 1

10 Oct 2013 — net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet. net/ipv6/ip6_output.c en el kernel de Linux hasta la versión 3.11.4 no determina adecuadamente la necesidad de UDP ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2811ebac2521ceac84f2bdae402455baa6a7fb47 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-476: NULL Pointer Dereference •

CVSS: 5.8EPSS: 0%CPEs: 274EXPL: 0

10 Oct 2013 — Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data. Error de superación en la función get_prng_bytes en crypto/ansi_cprng.c en el kernel de Linux hasta la versión 3.11.4 hace que sea más fácil para atacantes dependientes del contexto anular mecanism... • http://marc.info/?l=linux-crypto-vger&m=137942122902845&w=2 • CWE-189: Numeric Errors CWE-193: Off-by-one Error •

CVSS: 7.5EPSS: 0%CPEs: 265EXPL: 1

25 Sep 2013 — The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network. La implementación IPv6 SCTP en net/sctp/ipv6.c en el kernel de Linux hasta v3.11.1 utiliza estructuras de datos y llamadas a funciones que no provocan una configuración pretendida de encriptación IPsec, lo que permite a atacantes remot... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95ee62083cb6453e056562d91f597552021e6ae7 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

25 Sep 2013 — Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call. Vulnerabilidad de uso despues de liberación en drivers/net/tun.c en el kernel Linux 3.11.1 permite a usuarios locales obtener privilegios aprovechado CAP_NET_ADMIN e introduciendo un nombre de interfaz tuntap inválido en una llamada TUNSETIFF ioctl. The kernel-rt packages... • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html • CWE-399: Resource Management Errors CWE-416: Use After Free •

CVSS: 5.5EPSS: 0%CPEs: 241EXPL: 1

16 Sep 2013 — The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter. La función host_start en drivers/usb/Chipidea/host.c en el kernel de Linux anterior a la versión 3.7.4 no soporta adecuadamente una determinada opción no-streaming, que permite a usuarios locales provocar una denegación ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. drivers/hid/hid-zpff.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta la versión 3.11, cuando CONFIG_HID_ZEROPLUS está habilitado, permite físicamente a atacantes próximos causar una denegación de servicio (escritura fuera de... • http://marc.info/?l=linux-input&m=137772182014614&w=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 8.1EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-sensor-hub.c en el subsistema Human Interface Device (HID) en el kernel de Linux hasta la v3.11, cuando CONFIG_HID_SENSOR_HUB es activado, permite a atacantes físicamente próximos obtener información sensible de la memoria del núcleo a t... • http://marc.info/?l=linux-input&m=137772191114645&w=1 • CWE-20: Improper Input Validation •

CVSS: 9.8EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c. El subsistema Human Interface Device (HID) en el núcleo de Linux hasta v3.11, cuando CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, o CONF... • http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •