Page 459 of 2861 results (0.016 seconds)

CVSS: 4.6EPSS: 0%CPEs: 284EXPL: 1

The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application. La función ping_recvmsg en net/ipv4/ping.c en Linux kernel anterior a v3.12.4 no interactúa correctamente con la syscall read en socket ping, lo que permite a usuarios locales provocar una denegación de servicio (referencia a un puntero NULL y caída del sistema) aprovechando privilegios no especificados para ejecutar una aplicación manipulada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cf970c002d270c36202bd5b9c2804d3097a52da0 http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00003.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.4 http://www.openwall.com/lists/oss-security/2013/12/06/6 http://www.ubuntu.com/usn/USN-2113-1 http://www.ubuntu.com/usn/USN-2117-1 https://bugzilla.redhat.com/show_bug.cgi?id=1039046 https://github.com/torvalds/ •

CVSS: 4.7EPSS: 0%CPEs: 274EXPL: 0

The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application. La función perf_trace_event_perm en kernel/trace/trace_event_perf.c en el kernel Linux anteriores 3.12.2 no restringe apropiadamente el acceso al subsistema perf, lo que permite a usuarios locales habilitar el seguimiento de funciones a traves de una aplicación manipulada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=12ae030d54ef250706da5642fc7697cc60ad0df7 http://rhn.redhat.com/errata/RHSA-2014-0100.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2 http://www.ubuntu.com/usn/USN-2068-1 http://www.ubuntu.com/usn/USN-2070-1 http://www.ubuntu.com/usn/USN-2071-1 http://www.ubuntu.com/usn/USN-2072-1 http://www.ubuntu.com/usn/USN-2074-1 http://www.ubuntu.com/usn/USN& • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.1EPSS: 0%CPEs: 271EXPL: 1

The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header. La función ieee80211_radiotap_iterator_init en net/wireless/radiotap.c en el kernel de Linux anterior a 3.11.7 no comprueba si una trama contiene todos los datos fuera de la cabecera, lo que podría permitir a atacantes provocar una denegación de servicio (sobre-lectura de búfer) a través de un encabezado manipulado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f5563318ff1bde15b10e736e97ffce13be08bc1a http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html http://secunia.com/advisories/55606 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.7 http://www.securityfocus.com/bid/64013 http://www.securitytracker.com/id/1029413 http://www.ubuntu.com/usn/USN-2066-1 http:&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 3.3EPSS: 0%CPEs: 274EXPL: 0

The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. El kernel Linux anterior a 3.12.2 no utiliza apropiadamente la función get_dumpable, lo que permite a usuarios locales sortear restricciones ptrace u obtener información sensible de los registros IA64 a través de una aplicación manipulada, relacionado con kernel/ptrace.c y arch/ia64/include/asm/processor.h A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d049f74f2dbe71354d43d393ac3a188947811348 http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html http://rhn.redhat.com/errata/RHSA-2014-0100.html http://rhn.redhat.com/errata/RHSA-2014-0159.html http://rhn.redhat.com/errata/RHSA-2014-0285.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2 http: • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.7EPSS: 0%CPEs: 269EXPL: 1

The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call. La función fib6_add en net/ipv6/ip6_fib.c en el kernel de Linux anterior a 3.11.5 no implementa correctamente la codificación de código de error, lo que permite a usuarios locales provocar una denegación de servicio (referencia a un puntero NULL y caída del sistema) mediante el aprovechamiento de la capacidad CAP_NET_ADMIN de una llamada IPv6 SIOCADDRT ioctl. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2 http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html http://rhn.redhat.com/errata/RHSA-2014-0100.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5 http://www.openwall.com/lists/oss-security/2013/12/06/5 https://bugzilla.redhat.com/show_bug.cgi?id=1039054 https://github.com/torvalds/linux/commit/ae7b4e1f213aa659aedf9c6ecad0bf5f0476e1e2& • CWE-264: Permissions, Privileges, and Access Controls CWE-476: NULL Pointer Dereference •