Page 474 of 2662 results (0.028 seconds)

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The atyfb_ioctl function in drivers/video/fbdev/aty/atyfb_base.c in the Linux kernel through 4.12.10 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory by reading locations associated with padding bytes. La función atyfb_ioctl en drivers/video/fbdev/aty/atyfb_base.c en las versiones de Linux kernel hasta la 4.12.10 no inicializa una estructura de datos específica. Esto permite a los usuarios locales obtener información sensible de la memoria de pila del kernel leyendo ubicaciones relacionadas con bytes de relleno. • http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100634 https://github.com/torvalds/linux/pull/441 https://marc.info/?l=linux-kernel&m=150401461613306&w=2 https://marc.info/?l=linux-kernel&m=150453196710422&w=2 https://usn.ubuntu.com/3583-1 https://usn.ubuntu.com/3583-2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The move_pages system call in mm/migrate.c in the Linux kernel before 4.12.9 doesn't check the effective uid of the target process, enabling a local attacker to learn the memory layout of a setuid executable despite ASLR. La llamada al sistema move_pages en mm/migrate.c en versiones anteriores a la 4.12.9 del kernel Linux no verifica correctamente el id de usuario del proceso objetivo. Esto permite que un atacante local aprenda la distribución de la memoria de un ejecutable setuid a pesar de la ASLR. The move_pages system call in mm/migrate.c in the Linux kernel doesn't check the effective uid of the target process. This enables a local attacker to learn the memory layout of a setuid executable allowing mitigation of ASLR. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=197e7e521384a23b9e585178f3f11c9fa08274b9 http://www.debian.org/security/2017/dsa-3981 http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.9 http://www.securityfocus.com/bid/100876 https://access.redhat.com/errata/RHSA-2018:0676 https://access.redhat.com/errata/RHSA-2018:1062 https://github.com/torvalds/linux/commit/197e7e521384a23b9e585178f3f11c9fa08274b9 https://source.android.com/security/bulletin/pixel/2018-01& • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-863: Incorrect Authorization •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The tcp_disconnect function in net/ipv4/tcp.c in the Linux kernel before 4.12 allows local users to cause a denial of service (__tcp_select_window divide-by-zero error and system crash) by triggering a disconnect within a certain tcp_recvmsg code path. La función tcp_disconnect en net/ipv4/tcp.c en el kernel de Linux en versiones anteriores a la 4.12 permite que usuarios locales provoquen una denegación de servicio allows local users to cause a denial of service (error __tcp_select_window de división por cero y bloqueo del sistema) desencadenando una desconexión en una ruta de código tcp_recvmsg determinada. A divide-by-zero vulnerability was found in the __tcp_select_window function in the Linux kernel. This can result in a kernel panic causing a local denial of service. • http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=499350a5a6e7512d9ed369ed63a4244b6536f4f8 http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html http://www.debian.org/security/2017/dsa-3981 http://www.securityfocus.com/bid/100878 http://www.securitytracker.com/id/1039549 https://access.redhat.com/errata/RHSA-2017:2918 https://access.redhat.com/errata/RHSA-2017:2930 https://access.redhat.com/errata/RHSA-2017:2931 https://access.redhat.com/er • CWE-369: Divide By Zero •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

An integer overflow in the qla2x00_sysfs_write_optrom_ctl function in drivers/scsi/qla2xxx/qla_attr.c in the Linux kernel through 4.12.10 allows local users to cause a denial of service (memory corruption and system crash) by leveraging root access. Un desbordamiento de enteros en la función qla2x00_sysfs_write_optrom_ctl en drivers/scsi/qla2xxx/qla_attr.c en el kernel de Linux hasta la versión 4.12.10 permite que los usuarios locales provoquen una denegación de servicio (corrupción de memoria y fallo de sistema) con acceso root. • http://www.securityfocus.com/bid/100571 https://bugzilla.kernel.org/show_bug.cgi?id=194061 https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html https://patchwork.kernel.org/patch/9929625 https://usn.ubuntu.com/3583-1 https://usn.ubuntu.com/3583-2 • CWE-190: Integer Overflow or Wraparound •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The acpi_ns_evaluate() function in drivers/acpi/acpica/nseval.c in the Linux kernel through 4.12.9 does not flush the operand cache and causes a kernel stack dump, which allows local users to obtain sensitive information from kernel memory and bypass the KASLR protection mechanism (in the kernel through 4.9) via a crafted ACPI table. La función acpi_ns_evaluate() en drivers/acpi/acpica/nseval.c en el kernel Linux en su versión 4.12.9 no vacía la caché operativa y provoca un volcado de pila de kernel, lo que permite que usuarios locales obtengan información sensible de la memoria del kernel y omitan el mecanismo de protección KASLR (en la versión 4.9 del kernel) mediante una tabla ACPI manipulada. • http://www.securityfocus.com/bid/100497 https://github.com/acpica/acpica/pull/296/commits/37f2c716f2c6ab14c3ba557a539c3ee3224931b5 https://patchwork.kernel.org/patch/9850567 https://usn.ubuntu.com/3696-1 https://usn.ubuntu.com/3696-2 https://usn.ubuntu.com/3762-1 https://usn.ubuntu.com/3762-2 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •