Page 305 of 3243 results (0.028 seconds)

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

17 Aug 2005 — The syscall32_setup_pages function in syscall32.c for Linux kernel 2.6.12 and later, on the 64-bit x86 platform, does not check the return value of the insert_vm_struct function, which allows local users to trigger a memory leak via a 32-bit application with crafted ELF headers. • http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9fb1759a3102c26cd8f64254a7c3e532782c2bb8 •

CVSS: 9.1EPSS: 0%CPEs: 65EXPL: 0

16 Aug 2005 — Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c. • http://secunia.com/advisories/17002 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.5EPSS: 7%CPEs: 1EXPL: 1

12 Aug 2005 — vlan_dev.c in the VLAN code for Linux kernel 2.6.8 allows remote attackers to cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument, as demonstrated using snmpwalk on snmpd. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309308 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 72EXPL: 1

12 Aug 2005 — The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program. • http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA •

CVSS: 8.4EPSS: 5%CPEs: 1EXPL: 0

08 Aug 2005 — Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol. Desbordamiento de búfer en la función xdr_xcode_array2 en xdr.c en el kernel de Linux 2.6.5 y anterirores podría permitir a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante datos XDR artesa... • http://linux.bkbits.net:8080/linux-2.6/cset%4042b9c4fdYUuaq0joRUZi8W0Q-2hA1A •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

04 Aug 2005 — Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array. Desbordamiento en el índice del array en la función xfrm_sk_policy_insert en xfrm_user.c en el kernel de Linux 2.6 permite que usuarios locales provoquen una denegación de servicio y posiblemente ejeucte... • http://secunia.com/advisories/16298 • CWE-667: Improper Locking •

CVSS: 7.8EPSS: 0%CPEs: 92EXPL: 0

11 Jul 2005 — Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

30 Jun 2005 — The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address. La llamada a "ptrace" en el kernel de Linux 2.6.8.1 y 2.6.10 para la plataforma AMD64 permite que usuarios locales causen una denegación de servicio (caída del kernel) mediante una dirección "no-canónica". • http://secunia.com/advisories/15786 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

14 Jun 2005 — The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17073 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

08 Jun 2005 — ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17002 • CWE-399: Resource Management Errors •