Page 364 of 3901 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

25 Nov 2005 — ip_conntrack_proto_icmp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via a message without ICMP ID (ICMP_ID) information, which leads to a null dereference. • http://marc.info/?l=linux-kernel&m=113269476307795&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 37EXPL: 0

23 Nov 2005 — The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges. • http://secunia.com/advisories/17786 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 2%CPEs: 37EXPL: 0

23 Nov 2005 — The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash). • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

22 Nov 2005 — Linux kernel before after 2.6.12 and before 2.6.13.1 might allow attackers to cause a denial of service (Oops) via certain IPSec packets that cause alignment problems in standard multi-block cipher processors. NOTE: it is not clear whether this issue can be triggered by an attacker. • http://bugzilla.kernel.org/show_bug.cgi?id=5194 •

CVSS: 9.1EPSS: 0%CPEs: 134EXPL: 1

20 Nov 2005 — The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. • https://www.exploit-db.com/exploits/26489 • CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

09 Nov 2005 — Race condition in do_coredump in signal.c in Linux kernel 2.6 allows local users to cause a denial of service by triggering a core dump in one thread while another thread has a pending SIGSTOP. Condición de carrera en do_coredump en signal.c en el kernel 2.6 de Linux permite a usuarios locales causar una denegación de servicio disparando un volcado del núcleo (core dump) en un subproceso mientras otro tiene un SIGSTOP pendiente. • http://secunia.com/advisories/17917 •

CVSS: 5.5EPSS: 0%CPEs: 35EXPL: 1

27 Oct 2005 — The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash). • https://www.exploit-db.com/exploits/26382 •

CVSS: 5.5EPSS: 0%CPEs: 78EXPL: 1

25 Oct 2005 — The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command. • http://secunia.com/advisories/18523 • CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 1%CPEs: 3EXPL: 0

20 Oct 2005 — Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired. • http://lkml.org/lkml/2005/6/23/249 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

20 Oct 2005 — Exec in Linux kernel 2.6 does not properly clear posix-timers in multi-threaded environments, which results in a resource leak and could allow a large number of multiple local users to cause a denial of service by using more posix-timers than specified by the quota for a single user. • http://linux.bkbits.net:8080/linux-2.6/cset%40414b332fsZQvEUsfzKJIo-q2_ZH0hg •