Page 349 of 3790 results (0.022 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

21 Mar 2006 — net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory. net/ipv4/af_inet.c en el kernel de Linux 2.4 no aclara sockaddr_in.sin_zero antes de devolver los nombres de socket IPv4 de las funciones (1) getsockname, (2) getpeername y (3) accept, lo que permite a usuarios locales obtener porciones de memoria potencia... • https://www.exploit-db.com/exploits/27461 •

CVSS: 7.5EPSS: 3%CPEs: 156EXPL: 0

15 Mar 2006 — The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks. • http://secunia.com/advisories/19402 •

CVSS: 7.1EPSS: 0%CPEs: 89EXPL: 0

14 Mar 2006 — Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory. • http://secunia.com/advisories/19220 •

CVSS: 9.8EPSS: 0%CPEs: 124EXPL: 0

12 Mar 2006 — sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors. • http://lkml.org/lkml/2006/2/27/355 •

CVSS: 5.5EPSS: 0%CPEs: 99EXPL: 0

09 Mar 2006 — The die_if_kernel function in arch/ia64/kernel/unaligned.c in Linux kernel 2.6.x before 2.6.15.6, possibly when compiled with certain versions of gcc, has the "noreturn" attribute set, which allows local users to cause a denial of service by causing user faults on Itanium systems. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 5.5EPSS: 0%CPEs: 84EXPL: 0

07 Mar 2006 — Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address." • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 5.5EPSS: 2%CPEs: 101EXPL: 0

07 Mar 2006 — The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 5.5EPSS: 0%CPEs: 101EXPL: 0

07 Mar 2006 — Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 7.5EPSS: 20%CPEs: 42EXPL: 0

07 Feb 2006 — Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value. El kernel de Linux en versiones anteriores a 2.6.15.3 hasta la versión 2.6.12, mientras construye una respuesta ICMP en icmp_send, no maneja adecuadamente cuan... • http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 103EXPL: 0

31 Jan 2006 — Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call. El kernel de Linux 2.6.15.1 y versiones anteriores, cuando se ejecuta en arquitecturas SPARC, permite a usuarios locales provocar una denegación de servicio (cuelgue) a través del comando "date-s", lo que provoca argumentos de señal extendida no válidos para... • http://lists.debian.org/debian-sparc/2006/01/msg00129.html •