Page 508 of 2833 results (0.034 seconds)

CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 0

The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic. La función skb_gro_header_slow en includelinuxnetdevice.h en kernel de Linux anteriores a v2.6.39.4, cuando está activada la opción Generic Receive Offload (GRO), reinicia ciertos campos en situaciones incorrectas, lo que permite producir una denegación de servicio (caída del sistema) mediante una tráfico de red manipulado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17dd759c67f21e34f2156abcf415e1f60605a188 http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://openwall.com/lists/oss-security/2011/07/28/13 http://openwall.com/lists/oss-security/2011/07/29/1 http://securitytracker.com/id?1025876 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 http://www.redhat.com/support/errata/RHSA-2011-1321.html http://www.securityfocus.com/bid&# • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application. El subsistema Performance Events en el kernel de Linux antes de v3.1 no trata correctamente los desbordamientos de eventos asociados con eventos PERF_COUNT_SW_CPU_CLOCK, lo que permite a usuarios locales causar una denegación de servicio (bloqueo del sistema) a través de una aplicación modificada. • https://www.exploit-db.com/exploits/17769 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 http://www.openwall.com/lists/oss-security/2011/08/16/1 https://bugzilla.redhat.com/show_bug.cgi?id=730706 https://github.com/torvalds/linux/commit/a8b0ca17b80e92faab46ee7179ba9e99ccb61233 https://access.redhat.com/security/cve/CVE-2011-2918 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 4.9EPSS: 0%CPEs: 4EXPL: 0

The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call. La implementación del protocolo Network Lock Manager (NLM) en la funcionalidad de cliente NFS en el kernel de Linux anteriores a v3.0 permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una llamada de sistema flock LOCK_UN. • http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f http://rhn.redhat.com/errata/RHSA-2011-1212.html http://www.openwall.com/lists/oss-security/2011/06/23/6 https://bugzilla.redhat.com/show_bug.cgi?id=709393 https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f https://access.redhat.com/security/cve/CVE-2011-2491 • CWE-400: Uncontrolled Resource Consumption •

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 1

fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user's password. fs/proc/base.c del kernel de Linux en versiones anteriores a la 2.6.39.4 no restringe el acceso apropiadamente a los archivos /proc/#####/io, lo que facilita a usuarios locales obtener estadísticas sobre I/O confidenciales consultando un archivo, como se ha demostrado descubriendo la lengitud de la contraseña de otro usuario. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1d1221f375c94ef961ba8574ac4f85c8870ddd51 http://rhn.redhat.com/errata/RHSA-2011-1212.html http://www.openwall.com/lists/oss-security/2011/06/27/1 https://bugzilla.redhat.com/show_bug.cgi?id=716825 https://github.com/torvalds/linux/commit/1d1221f375c94ef961ba8574ac4f85c8870ddd51 https://access.redhat.com/security/cve/CVE-2011-2495 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 8.3EPSS: 0%CPEs: 1EXPL: 0

Integer underflow in the l2cap_config_req function in net/bluetooth/l2cap_core.c in the Linux kernel before 3.0 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a small command-size value within the command header of a Logical Link Control and Adaptation Protocol (L2CAP) configuration request, leading to a buffer overflow. Desbordamiento de enteros en la función l2cap_config_req en net/bluetooth/l2cap_core.c en el Kernel de Linux anterior a v3.0 permite a atacantes remotos provocar una denegación de servicio o posiblemente tner otro impacto desconocido a través de un pequeño valor "command-size" dentro del comando header en un "Control de Enlace Lógico" (Logical Link Control) y petición de configuración de "Protocolo de Adaptación" (Adaptation Protocol (L2CAP)), cargando un desbordamiento de bufer. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7ac28817536797fd40e9646452183606f9e17f71 http://marc.info/?l=linux-kernel&m=130891911909436&w=2 http://securityreason.com/securityalert/8359 http://www.kernel.org/pub/linux/kernel/v3.0/ChangeLog-3.0 http://www.openwall.com/lists/oss-security/2011/06/24/9 http://www.openwall.com/lists/oss-security/2011/06/27/3 http://www.osvdb.org/74679 http://www.securityfocus.com/bid/48472 https:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-191: Integer Underflow (Wrap or Wraparound) •