Page 4 of 22 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The cmd_boot function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to bypass intended device-lock and kernel-signature restrictions by using fastboot mode in a boot command for an arbitrary kernel image. La función cmd_boot en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con las contribuciones Android Qualcomm Innovation Center (QuIC) para los dispositivos MSM y otros productos, permite a atacantes evadir las restricciones de bloqueo del dispositivo y firma del kernel mediante el uso del modo de arranque rápido en un comando de arranque para un imagen del kernel arbitrario. • https://www.codeaurora.org/projects/security-advisories/fastboot-boot-command-bypasses-signature-verification-cve-2014-4325 • CWE-287: Improper Authentication •

CVSS: 1.9EPSS: 0%CPEs: 1EXPL: 0

The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image. La función boot_linux_from_mmc en app/aboot/aboot.c en el bootloader Little Kernel (LK), distribuido con las contribuciones de Android Qualcomm Innovation Center (QuIC) para los dispositivos MSM y otros productos, no valida debidamente cierto valor de direcciones, lo que permite a atacantes escribir datos en una localización de memoria controlable mediante el aprovechamiento de la habilidad de iniciar un intento de arranque de un imagen arbitrario. • http://source.android.com/security/bulletin/2016-07-01.html https://www.codeaurora.org/projects/security-advisories/lk-insufficient-verification-tagaddr-when-loading-device-tree-cve-2014-0974 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

(a) mount and (b) umount in util-linux 2.14.1, 2.17.2, and probably other versions allow local users to determine the existence of restricted directories by (1) using the --guess-fstype command-line option or (2) attempting to mount a non-existent device, which generates different error messages depending on whether the directory exists. (a) mount y (b) unmount en util-linux 2.14.1, 2.17.2, y probablemente otras versiones permite a usuarios locales determinar la existencia de directorios restringidos mediante (1) el uso de la opción de comando --guess-fstype command-line o (2) intentar montar un dispositivo inexistente, lo que genera diferentes mensajes de error dependiendo de si el directorio existe. • http://bugs.debian.org/697464 http://marc.info/?l=oss-security&m=135749410312247&w=2 http://osvdb.org/88953 http://rhn.redhat.com/errata/RHSA-2013-0517.html http://www.mandriva.com/security/advisories?name=MDVSA-2013:154 https://bugzilla.redhat.com/show_bug.cgi?id=892330 https://access.redhat.com/security/cve/CVE-2013-0157 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.9EPSS: 0%CPEs: 10EXPL: 3

The sg_build_indirect function in drivers/scsi/sg.c in Linux kernel 2.6.28-rc1 through 2.6.31-rc8 uses an incorrect variable when accessing an array, which allows local users to cause a denial of service (kernel OOPS and NULL pointer dereference), as demonstrated by using xcdroast to duplicate a CD. NOTE: this is only exploitable by users who can open the cdrom device. La función sg_build_indirect en drivers/scsi/sg.c en el kernel de linux v 2.6.28-rc1 a la v2.6.31-rc8 emplea una variable incorrecta cuando accede a una matriz, lo que permite a usuarios locales provocar una denegación de servicio (Kernel OOPS y una deferencia a puntero NULL), como se ha demostrado usando xcdroast para duplicar un CD. NOTA: esto es explotable únicamente por usuarios que pueden abrir la unidad de CD. • http://lkml.org/lkml/2009/9/3/1 http://lkml.org/lkml/2009/9/3/107 http://secunia.com/advisories/37105 http://www.openwall.com/lists/oss-security/2009/09/03/4 http://www.ubuntu.com/usn/USN-852-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which causes the timer to always be expired. Desbordamiento de entero en la función hrtimer_forward function (hrtimer.c) en el kernel 2.6.21-rc4 de Linux, cuando corren en sistemas de 64-bit, permite a los usuarios locales provocar una denegación de servicio (bucle infinito) mediante un temporizador con un valor de caducidad largo, que provoca que el temporizador esté siempre expirado. • http://git.kernel.org/?p=linux/kernel/git/chris/linux-2.6.git%3Ba=commitdiff%3Bh=13788ccc41ceea5893f9c747c59bc0b28f2416c2 http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html http://secunia.com/advisories/30294 http://secunia.com/advisories/30368 http://secunia.com/advisories/30818 http://secunia.com/advisories/31107 http://secunia.com/advisories/31628 http://www.debian.org/security/2008/dsa-1588 http://www.redhat.com/support/errata/RHSA-2008-0275.html http:/ • CWE-189: Numeric Errors CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •