Page 406 of 4339 results (0.016 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2005 — The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169130 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 3

31 Dec 2005 — The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running. • https://packetstorm.news/files/id/42925 •

CVSS: 5.5EPSS: 0%CPEs: 59EXPL: 0

31 Dec 2005 — The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function. Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. • http://marc.info/?l=linux-kernel&m=112323336017157 •

CVSS: 7.8EPSS: 0%CPEs: 26EXPL: 0

31 Dec 2005 — Buffer overflow in the CA-driver (dst_ca.c) for TwinHan DST Frontend/Card in Linux kernel 2.6.12 and other versions before 2.6.15 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by "reading more than 8 bytes into an 8 byte long array". • http://secunia.com/advisories/18216 •

CVSS: 5.5EPSS: 0%CPEs: 87EXPL: 1

31 Dec 2005 — The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules. Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. • http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg •

CVSS: 9.1EPSS: 1%CPEs: 1EXPL: 0

31 Dec 2005 — nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html • CWE-862: Missing Authorization •

CVSS: 7.5EPSS: 1%CPEs: 7EXPL: 2

31 Dec 2005 — The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value. • https://packetstorm.news/files/id/79987 •

CVSS: 7.5EPSS: 0%CPEs: 215EXPL: 0

22 Dec 2005 — Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 •

CVSS: 5.5EPSS: 0%CPEs: 98EXPL: 2

14 Dec 2005 — Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs. Linux kernel anteriores a 2.6.15, permite a usuarios locales causar una denegación de servicio (pánico) mediante una llamada set_mempolicy con una máscara de bits 0, lo que causa un pánico cuando ocurre un fallo de página. • https://www.exploit-db.com/exploits/27031 •

CVSS: 7.8EPSS: 1%CPEs: 26EXPL: 0

27 Nov 2005 — Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed. A ridiculous number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html •