Page 507 of 5112 results (0.022 seconds)

CVSS: 6.2EPSS: 9%CPEs: 64EXPL: 0

22 Aug 2005 — The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458. • http://bugs.gentoo.org/show_bug.cgi?id=94584 • CWE-476: NULL Pointer Dereference •

CVSS: 9.1EPSS: 0%CPEs: 65EXPL: 0

16 Aug 2005 — Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c. • http://secunia.com/advisories/17002 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.8EPSS: 0%CPEs: 92EXPL: 0

11 Jul 2005 — Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 9.1EPSS: 0%CPEs: 29EXPL: 1

17 May 2005 — Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html •

CVSS: 7.8EPSS: 0%CPEs: 129EXPL: 1

11 May 2005 — The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 •

CVSS: 7.5EPSS: 0%CPEs: 34EXPL: 0

02 May 2005 — The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow attackers to cause a denial of service (oops) via SMP. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.8 •

CVSS: 7.2EPSS: 0%CPEs: 259EXPL: 0

01 Apr 2005 — The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.5EPSS: 0%CPEs: 247EXPL: 2

20 Mar 2005 — Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem. • https://www.exploit-db.com/exploits/25234 •

CVSS: 7.5EPSS: 0%CPEs: 183EXPL: 0

09 Mar 2005 — Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 •

CVSS: 7.8EPSS: 0%CPEs: 107EXPL: 0

22 Feb 2005 — Some futex functions in futex.c for Linux kernel 2.6.x perform get_user calls while holding the mmap_sem semaphore, which could allow local users to cause a deadlock condition in do_page_fault by triggering get_user faults while another thread is executing mmap or other functions. • http://linux.bkbits.net:8080/linux-2.6/cset%40421cfc11zFsK9gxvSJ2t__FCmuUd3Q •