Page 365 of 3812 results (0.017 seconds)

CVSS: 7.1EPSS: 0%CPEs: 54EXPL: 1

31 Dec 2004 — A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. • http://secunia.com/advisories/18977 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2004 — Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. • http://marc.info/?l=bugtraq&m=110376890429798&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

31 Dec 2004 — The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 1

31 Dec 2004 — The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. • http://secunia.com/advisories/11577 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

31 Dec 2004 — Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. • http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html • CWE-190: Integer Overflow or Wraparound •

CVSS: 4.7EPSS: 0%CPEs: 32EXPL: 0

22 Dec 2004 — Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 6.4EPSS: 0%CPEs: 32EXPL: 0

22 Dec 2004 — Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. • http://secunia.com/advisories/17002 •

CVSS: 10.0EPSS: 33%CPEs: 98EXPL: 1

15 Dec 2004 — Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. • https://www.exploit-db.com/exploits/686 •

CVSS: 5.5EPSS: 0%CPEs: 98EXPL: 2

15 Dec 2004 — The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition. La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la fu... • https://www.exploit-db.com/exploits/685 •

CVSS: 5.5EPSS: 0%CPEs: 104EXPL: 2

15 Dec 2004 — Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/690 •