Page 537 of 4921 results (0.024 seconds)

CVSS: 9.3EPSS: 0%CPEs: 22EXPL: 0

An issue was discovered in the Linux kernel before 4.20. There is a race condition in smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c, leading to a use-after-free. Fue descubierto un fallo en el kernel de Linux anterior a 4.20. Hay una condición de carrera en smp_task_timedout() y smp_task_done() en drivers/scsi/libsas/sas_expander.c, permitiendo el uso después de liberación de memoria. A flaw was found in the Linux kernel’s implementation of the SAS expander subsystem, where a race condition exists in the smp_task_timedout() and smp_task_done() in drivers/scsi/libsas/sas_expander.c. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00014.html http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00025.html http://www.securityfocus.com/bid/108196 https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b90cd6f2b905905fb42671009dc0e27c310a16ae https://github.com/torvalds/linux/commit/b90cd6f2b905905fb42671009dc0e27c310a16ae https://lists.debian.org/debian-lts-announce/2019/08/msg00016.html https://lists.debian.org/debian-lts-announce/2019/08/msg00017.h • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVSS: 7.8EPSS: 1%CPEs: 12EXPL: 0

An issue was discovered in the Linux kernel before 5.0.7. A NULL pointer dereference can occur when megasas_create_frame_pool() fails in megasas_alloc_cmds() in drivers/scsi/megaraid/megaraid_sas_base.c. This causes a Denial of Service, related to a use-after-free. Fue descubierto un fallo en el kernel de Linux anterior a 5.0.7. Una desreferencia de puntero NULL puede ocurrir cuando falla megasas_create_frame_pool() en megasas_alloc_cmds() en drivers/scsi/megaraid/megaraid_sas_base.c. • http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00055.html http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00056.html http://www.securityfocus.com/bid/108286 https://access.redhat.com/errata/RHSA-2019:1959 https://access.redhat.com/errata/RHSA-2019:1971 https://access.redhat.com/errata/RHSA-2019:2029 https://access.redhat.com/errata/RHSA-2019:2043 https://access.redhat.com/errata/RHSA-2019:2736 https://access.redhat.com/errata/RHSA-2019:2837 https • CWE-416: Use After Free CWE-476: NULL Pointer Dereference •

CVSS: 10.0EPSS: 1%CPEs: 2EXPL: 0

udp_gro_receive_segment in net/ipv4/udp_offload.c in the Linux kernel 5.x before 5.0.13 allows remote attackers to cause a denial of service (slab-out-of-bounds memory corruption) or possibly have unspecified other impact via UDP packets with a 0 payload, because of mishandling of padded packets, aka the "GRO packet of death" issue. udp_gro_receive_segment en net/ipv4/udp_offload.c en el kernel de Linux versiones desde la 5.x hasta la 5.0.13 permite a los atacantes remotos causar una denegación de servicio (corrupción de memoria fuera de límites) o posiblemente tener otro impacto no especificado a través de paquetes UDP con una carga útil de 0, debido a un manejo incorrecto de los paquetes de relleno, también conocido como el problema del "GRO packet of death". • http://www.openwall.com/lists/oss-security/2019/05/02/1 http://www.openwall.com/lists/oss-security/2019/05/05/4 http://www.securityfocus.com/bid/108142 https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.13 https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=4dd2b82d5adfbe0b1587ccad7a8f76d826120f37 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7CYLTCIRTKUB4R2TLLUYPZLDQL44OBG https://security.netapp.com/advisory/ • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The print_binder_transaction_ilocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading "*from *code *flags" lines in a debugfs file. La función print_binder_transaction_ilocked en drivers/android/binder.c en el kernel de Linux versión 4.14.90 permite a los usuarios locales obtener información sensible de direcciones, leyendo líneas "*from *code *flags" en un archivo de depuración. • http://www.securityfocus.com/bid/108125 https://github.com/Yellow-Pay/CVE/blob/master/CVE-2018-20510 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs file. La función print_binder_ref_olocked en el archivo drivers/android/ binder.c en el kernel de Linux versión 4.14.90, permite a los usuarios locales conseguir información de direcciones confidenciales al leer las líneas "ref*desc*node" en un archivo debugfs. • https://github.com/Yellow-Pay/CVE/blob/master/CVE-2018-20509.md https://security.netapp.com/advisory/ntap-20190517-0002 https://www.mail-archive.com/debian-security-tracker%40lists.debian.org/msg03902.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •