Page 298 of 3243 results (0.016 seconds)

CVSS: 7.1EPSS: 0%CPEs: 89EXPL: 0

14 Mar 2006 — Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory. • http://secunia.com/advisories/19220 •

CVSS: 9.8EPSS: 0%CPEs: 124EXPL: 0

12 Mar 2006 — sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors. • http://lkml.org/lkml/2006/2/27/355 •

CVSS: 5.5EPSS: 0%CPEs: 99EXPL: 0

09 Mar 2006 — The die_if_kernel function in arch/ia64/kernel/unaligned.c in Linux kernel 2.6.x before 2.6.15.6, possibly when compiled with certain versions of gcc, has the "noreturn" attribute set, which allows local users to cause a denial of service by causing user faults on Itanium systems. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 5.5EPSS: 0%CPEs: 84EXPL: 0

07 Mar 2006 — Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address." • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 5.5EPSS: 2%CPEs: 101EXPL: 0

07 Mar 2006 — The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 5.5EPSS: 0%CPEs: 101EXPL: 0

07 Mar 2006 — Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 7.5EPSS: 20%CPEs: 42EXPL: 0

07 Feb 2006 — Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value. El kernel de Linux en versiones anteriores a 2.6.15.3 hasta la versión 2.6.12, mientras construye una respuesta ICMP en icmp_send, no maneja adecuadamente cuan... • http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 103EXPL: 0

31 Jan 2006 — Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call. El kernel de Linux 2.6.15.1 y versiones anteriores, cuando se ejecuta en arquitecturas SPARC, permite a usuarios locales provocar una denegación de servicio (cuelgue) a través del comando "date-s", lo que provoca argumentos de señal extendida no válidos para... • http://lists.debian.org/debian-sparc/2006/01/msg00129.html •

CVSS: 5.5EPSS: 0%CPEs: 47EXPL: 0

06 Jan 2006 — dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key. dm-crypt en el kernel de Linux 2.6.15 y versiones anteriores no borra una estructura antes de ser liberada, lo que lleva a una divulgación de memoria que puede permitir a usuarios locales obtener información sensible de una clave criptográfica. • http://marc.info/?l=linux-kernel&m=113640535312572&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 114EXPL: 0

06 Jan 2006 — wan/sdla.c in Linux kernel 2.6.x before 2.6.11 and 2.4.x before 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels. • http://linux.bkbits.net:8080/linux-2.4/cset%401.1448.91.23?nav=index.html%7Csrc/%7Csrc/drivers%7Csrc/drivers/net%7Csrc/drivers/net/wan%7Crelated/drivers/net/wan/sdla.c •