Page 310 of 3243 results (0.015 seconds)

CVSS: 7.0EPSS: 0%CPEs: 53EXPL: 0

19 Jan 2005 — Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2004 — Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors. • http://secunia.com/advisories/19374 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2004 — Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. • http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 7.1EPSS: 0%CPEs: 54EXPL: 1

31 Dec 2004 — A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. • http://secunia.com/advisories/18977 •

CVSS: 7.8EPSS: 0%CPEs: 29EXPL: 0

31 Dec 2004 — Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 6.3EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — Race condition in the sysfs_read_file and sysfs_write_file functions in Linux kernel before 2.6.10 allows local users to read kernel memory and cause a denial of service (crash) via large offsets in sysfs files. • http://kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.10-rc1/2.6.10-rc1-mm1/broken-out/fix-race-in-sysfs_read_file-and-sysfs_write_file.patch •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. • http://marc.info/?l=bugtraq&m=110376890429798&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

31 Dec 2004 — The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

31 Dec 2004 — The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. • http://secunia.com/advisories/11577 •

CVSS: 7.8EPSS: 0%CPEs: 102EXPL: 2

31 Dec 2004 — Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function. • http://archives.neohapsis.com/archives/bugtraq/2004-06/0463.html • CWE-189: Numeric Errors •