Page 542 of 5519 results (0.024 seconds)

CVSS: 5.5EPSS: 0%CPEs: 25EXPL: 0

25 Nov 2005 — A locking problem in POSIX timer cleanup handling on exit in Linux kernel 2.6.10 to 2.6.14, when running on SMP systems, allows local users to cause a denial of service (deadlock) involving process CPU timers. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=25f407f0b668f5e4ebd5d13e1fb4306ba6427ead •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

25 Nov 2005 — ip_conntrack_proto_icmp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via a message without ICMP ID (ICMP_ID) information, which leads to a null dereference. • http://marc.info/?l=linux-kernel&m=113269476307795&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 37EXPL: 0

23 Nov 2005 — The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges. • http://secunia.com/advisories/17786 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 2%CPEs: 37EXPL: 0

23 Nov 2005 — The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 2.6.14.2, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash). • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

22 Nov 2005 — Linux kernel before after 2.6.12 and before 2.6.13.1 might allow attackers to cause a denial of service (Oops) via certain IPSec packets that cause alignment problems in standard multi-block cipher processors. NOTE: it is not clear whether this issue can be triggered by an attacker. • http://bugzilla.kernel.org/show_bug.cgi?id=5194 •

CVSS: 9.1EPSS: 0%CPEs: 134EXPL: 1

20 Nov 2005 — The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table. • https://www.exploit-db.com/exploits/26489 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 35EXPL: 1

27 Oct 2005 — The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash). • https://www.exploit-db.com/exploits/26382 •

CVSS: 4.7EPSS: 1%CPEs: 3EXPL: 0

20 Oct 2005 — Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired. • http://lkml.org/lkml/2005/6/23/249 • CWE-476: NULL Pointer Dereference •

CVSS: 7.5EPSS: 4%CPEs: 117EXPL: 0

20 Oct 2005 — The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.5EPSS: 0%CPEs: 31EXPL: 0

20 Oct 2005 — The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information. • http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw •