Page 352 of 3784 results (0.016 seconds)

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

25 Nov 2005 — A locking problem in POSIX timer cleanup handling on exit in Linux kernel 2.6.10 to 2.6.14, when running on SMP systems, allows local users to cause a denial of service (deadlock) involving process CPU timers. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=25f407f0b668f5e4ebd5d13e1fb4306ba6427ead •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

25 Nov 2005 — ip_conntrack_proto_icmp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via a message without ICMP ID (ICMP_ID) information, which leads to a null dereference. • http://marc.info/?l=linux-kernel&m=113269476307795&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

25 Nov 2005 — The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information, which triggers a null dereference. • http://marc.info/?l=linux-kernel&m=113269476105016&w=2 •

CVSS: 6.6EPSS: 0%CPEs: 106EXPL: 0

25 Nov 2005 — The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=bbbe80cdaf72a75a463aff9551e60b31e2f69061%3Bhp=f841bde30c18493a94fd5d522b84724a8eb82a4a%3Bhb=4ea6a8046bb49d43c950898f0cb4e1994ef6c89d%3Bf=net/ipv6/ip6_flowlabel.c • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 37EXPL: 0

23 Nov 2005 — The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges. • http://secunia.com/advisories/17786 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 2%CPEs: 37EXPL: 0

23 Nov 2005 — The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash). • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

22 Nov 2005 — Linux kernel before after 2.6.12 and before 2.6.13.1 might allow attackers to cause a denial of service (Oops) via certain IPSec packets that cause alignment problems in standard multi-block cipher processors. NOTE: it is not clear whether this issue can be triggered by an attacker. • http://bugzilla.kernel.org/show_bug.cgi?id=5194 •

CVSS: 9.1EPSS: 0%CPEs: 134EXPL: 1

20 Nov 2005 — The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. • https://www.exploit-db.com/exploits/26489 • CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

09 Nov 2005 — Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP. Condición de carrera en do_coredump en signal.c en el kernel 2.6 de Linux permite a usuarios locales causar una denegación de servicio disparando un volcado del núcleo (core dump) en un subproceso mientras otro tiene un SIGSTOP pendiente. • http://secunia.com/advisories/17917 •

CVSS: 5.5EPSS: 0%CPEs: 35EXPL: 1

27 Oct 2005 — The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash). • https://www.exploit-db.com/exploits/26382 •