Page 302 of 3121 results (0.049 seconds)

CVSS: 7.8EPSS: 0%CPEs: 55EXPL: 0

23 Jun 2004 — Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool. Múltiples vulnerabilidades desconocidas en el kernel de Linux 2.4 y 2.6 permiten a usuarios locales ganar privilegios o acceder a memoria del kernel, como se ha encontrado mediante la herramienta de comprobación de código fuente "Sparse". • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 •

CVSS: 5.5EPSS: 0%CPEs: 55EXPL: 1

15 Jun 2004 — Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. El kernel de Linux 2.4.2x y 2.6.x para x86 permite a usuarios locales causar una denegación de servicio (caída del sistema), posiblemente mediante un bucle infinito que dispara un manejador de señal con una cierta secuencia de instruccion... • https://www.exploit-db.com/exploits/306 •

CVSS: 7.1EPSS: 0%CPEs: 93EXPL: 0

08 Jun 2004 — The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. El controlador e1000 del kernel de Linux 2.4.26 y anteriores no inicializa la memoria antes de usarla, lo que permite a usuarios locales leer porciones de la memoria del kernel. NOTA: Este problema ha sido originalmente descrito incorrectamente por otra... • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

03 Jun 2004 — Integer signedness error in the cpufreq proc handler (cpufreq_procctl) in Linux kernel 2.6 allows local users to gain privileges. Error falta de signo en enteros en el manejador proc cpufreq (cpufrep_procctl) en Linux kernel 2.6 permite a usuarios locales ganar privilegios. • https://www.exploit-db.com/exploits/24043 •

CVSS: 2.1EPSS: 0%CPEs: 184EXPL: 3

26 May 2004 — cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption. • https://www.exploit-db.com/exploits/25707 •

CVSS: 9.8EPSS: 0%CPEs: 34EXPL: 0

05 May 2004 — The framebuffer driver in Linux kernel 2.6.x does not properly use the fb_copy_cmap function, with unknown impact. El controlador de framebuffer en Linux kernel 2.6.x no usa adecuadamente la función fb_copy_cmap, con impacto desconocido. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

30 Apr 2004 — The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call. La función do_fork en Linux 2.4.x y 2.6.x no decrementa el contador mm_count cuando un error ocurre después de que se haya activado mm_struct de un proceso hijo, lo qu... • ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 2

30 Apr 2004 — Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option. Desbordamiento de enteros en la función ip_setsockopt en el kernel de Linux 2.4.22 a 2.4.25 y 2.6.1 a 2.6.3 permite a usuarios locales causar una denegación de servicio (caída) o ejecutar código arbitrario mediante la opción de socket MCAST_MSFILTER. • https://www.exploit-db.com/exploits/274 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Apr 2004 — The XFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the XFS file system, which allows local users to obtain sensitive information by reading the raw device. El código del sistema de ficheros XFS en Linux 2.4.x tiene una fuga de información en la cual datas de memoria son escritos en el dispositivo de un sistema de ficheros ext3, lo que permite a usuarios locales obtener información sensible leyendo el dispositivo directamente (raw) • ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

17 Apr 2004 — The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device. • http://marc.info/?l=bugtraq&m=108213675028441&w=2 •