Page 379 of 3885 results (0.391 seconds)

CVSS: 5.5EPSS: 0%CPEs: 101EXPL: 0

07 Mar 2006 — Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 •

CVSS: 7.5EPSS: 20%CPEs: 42EXPL: 0

07 Feb 2006 — Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value. El kernel de Linux en versiones anteriores a 2.6.15.3 hasta la versión 2.6.12, mientras construye una respuesta ICMP en icmp_send, no maneja adecuadamente cuan... • http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 103EXPL: 0

31 Jan 2006 — Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call. El kernel de Linux 2.6.15.1 y versiones anteriores, cuando se ejecuta en arquitecturas SPARC, permite a usuarios locales provocar una denegación de servicio (cuelgue) a través del comando "date-s", lo que provoca argumentos de señal extendida no válidos para... • http://lists.debian.org/debian-sparc/2006/01/msg00129.html •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

11 Jan 2006 — The netlink_rcv_skb function in af_netlink.c in Linux kernel 2.6.14 and 2.6.15 allows local users to cause a denial of service (infinite loop) via a nlmsg_len field of 0. • http://secunia.com/advisories/18482 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 47EXPL: 0

06 Jan 2006 — dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key. dm-crypt en el kernel de Linux 2.6.15 y versiones anteriores no borra una estructura antes de ser liberada, lo que lleva a una divulgación de memoria que puede permitir a usuarios locales obtener información sensible de una clave criptográfica. • http://marc.info/?l=linux-kernel&m=113640535312572&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 114EXPL: 0

06 Jan 2006 — wan/sdla.c in Linux kernel 2.6.x before 2.6.11 and 2.4.x before 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels. • http://linux.bkbits.net:8080/linux-2.4/cset%401.1448.91.23?nav=index.html%7Csrc/%7Csrc/drivers%7Csrc/drivers/net%7Csrc/drivers/net/wan%7Crelated/drivers/net/wan/sdla.c •

CVSS: 5.5EPSS: 0%CPEs: 87EXPL: 1

31 Dec 2005 — The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules. • http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 1

31 Dec 2005 — The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value. • https://www.exploit-db.com/exploits/9363 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 2

31 Dec 2005 — The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • http://archives.neohapsis.com/archives/openbsd/2005-10/1523.html •

CVSS: 7.1EPSS: 0%CPEs: 72EXPL: 0

31 Dec 2005 — Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 •