Page 293 of 3121 results (0.028 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

30 Sep 2005 — The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus. • http://secunia.com/advisories/17141 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

30 Sep 2005 — mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to cause a denial of service or an information leak via an ioremap on a certain memory map that causes the iounmap to perform a lookup of a page that does not exist. • http://secunia.com/advisories/17141 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

26 Sep 2005 — The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument. • http://linux.bkbits.net:8080/linux-2.6/cset%4042eef8b09C5r6iI0LuMe5Uy3k05c5g •

CVSS: 5.5EPSS: 0%CPEs: 66EXPL: 0

22 Sep 2005 — Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems. • http://kernel.org/git/?p=linux/kernel/git/aegl/linux-2.6.git%3Ba=commitdiff%3Bh=35311d6478077f7bfe35c1c653193e658bf32686 •

CVSS: 5.5EPSS: 0%CPEs: 45EXPL: 0

14 Sep 2005 — The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 42EXPL: 0

14 Sep 2005 — The Linux kernel 2.6 before 2.6.12.1 allows local users to cause a denial of service (kernel panic) via a non group-leader thread executing a different program than was pending in itimer, which causes the signal to be delivered to the old group-leader task, which does not exist. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1 •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

14 Sep 2005 — Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 •

CVSS: 7.5EPSS: 6%CPEs: 61EXPL: 0

09 Sep 2005 — The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237 •

CVSS: 2.1EPSS: 0%CPEs: 62EXPL: 0

09 Sep 2005 — The ipt_recent kernel module (ipt_recent.c) in Linux kernel 2.6.12 and earlier does not properly perform certain time tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early, a different vulnerability than CVE-2005-2872. • http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-module •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

06 Sep 2005 — xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied. • http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html • CWE-697: Incorrect Comparison •