Page 298 of 3121 results (0.026 seconds)

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2004 — Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors. • http://secunia.com/advisories/19374 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2004 — Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. • http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.1EPSS: 0%CPEs: 54EXPL: 1

31 Dec 2004 — A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. • http://secunia.com/advisories/18977 •

CVSS: 7.8EPSS: 0%CPEs: 29EXPL: 0

31 Dec 2004 — Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. • http://marc.info/?l=bugtraq&m=110376890429798&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

31 Dec 2004 — The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

31 Dec 2004 — The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. • http://secunia.com/advisories/11577 •

CVSS: 7.8EPSS: 0%CPEs: 102EXPL: 2

31 Dec 2004 — Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0463.html • CWE-189: Numeric Errors •

CVSS: 5.5EPSS: 34%CPEs: 62EXPL: 1

31 Dec 2004 — load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=142965 •

CVSS: 5.5EPSS: 0%CPEs: 72EXPL: 0

31 Dec 2004 — Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests. • http://linux.bkbits.net:8080/linux-2.6/cset%404182a613oVsK0-8eCWpyYFrUf8rhLA •