Page 293 of 2980 results (0.025 seconds)

CVSS: 5.5EPSS: 0%CPEs: 45EXPL: 0

14 Sep 2005 — The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 42EXPL: 0

14 Sep 2005 — The Linux kernel 2.6 before 2.6.12.1 allows local users to cause a denial of service (kernel panic) via a non group-leader thread executing a different program than was pending in itimer, which causes the signal to be delivered to the old group-leader task, which does not exist. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1 •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

14 Sep 2005 — Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 •

CVSS: 7.5EPSS: 6%CPEs: 61EXPL: 0

09 Sep 2005 — The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237 •

CVSS: 2.1EPSS: 0%CPEs: 62EXPL: 0

09 Sep 2005 — The ipt_recent kernel module (ipt_recent.c) in Linux kernel 2.6.12 and earlier does not properly perform certain time tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early, a different vulnerability than CVE-2005-2872. • http://blog.blackdown.de/2005/05/09/fixing-the-ipt_recent-netfilter-module •

CVSS: 5.5EPSS: 1%CPEs: 63EXPL: 0

22 Aug 2005 — The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •

CVSS: 6.2EPSS: 15%CPEs: 63EXPL: 0

22 Aug 2005 — inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables". • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •

CVSS: 5.5EPSS: 1%CPEs: 63EXPL: 0

22 Aug 2005 — The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 5%CPEs: 63EXPL: 0

22 Aug 2005 — The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •

CVSS: 6.2EPSS: 9%CPEs: 64EXPL: 0

22 Aug 2005 — The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458. • http://bugs.gentoo.org/show_bug.cgi?id=94584 • CWE-476: NULL Pointer Dereference •