Page 546 of 2833 results (0.022 seconds)

CVSS: 4.9EPSS: 0%CPEs: 141EXPL: 0

The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space. La función wake_futex_pi de kernel/futex.c del kernel de Linux en versiones anteriores a la v2.6.33-rc7 no gestiona apropiadamente ciertas operaciones de "unlock" (liberación) de "Priority Inheritance (PI) futex" (futex de herencia de prioridad), lo que permite a usuarios locales provocar una denegación de servicio (OOPS) y posiblemente otras acciones sin especificar a través de vectores de ataque relacionados con la modificación de los valores de futex del espacio de usuario. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=51246bfd189064079c54421507236fd2723b18f3 http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035070.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00006.html http://secunia.com/advisories/38779 http://secunia.com/advisories/38905 http://secunia.com/advisories/38922 http://secunia.com/advisories/39033 http:/ •

CVSS: 4.9EPSS: 0%CPEs: 14EXPL: 0

The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem. La función futex_lock_pi en kernel/futex.c en el kernel de Linux anterior a 2.6.33-rc7 no maneja adecuadamente determinadas cuentas de referencia, lo que permite a usuarios locales provocar una denegación de servicio (OOPS) a través de vectores que involucran el desmontado del sistema de ficheros ext3. • http://bugzilla.kernel.org/show_bug.cgi?id=14256 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5ecb01cfdf96c5f465192bdb2a4fd4a61a24c6cc http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00006.html http://secunia.com/advisories/38922 http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.33-rc7 http://www.mandriva.com/security/advisories?name=MDVSA-2010:088 http://www.openwall.com/lists/oss-security/2010/02/11/2 http:/ •

CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0

The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, a related issue to CVE-2010-0306. El emulador x86 en KVM3, no usa Current Privilege Level (CPL) e I/O Privilege Level (IOPL) para para determinar el acceso a memoria disponible para el código CPL3, lo que permite a invitados del SO provocar una denegación de servicio (caída del SO invitado) o elevar sus privilegios aprovechando el acceso al (1) puerto IO o (2) a la región MMIO. Cuestión relacionada con CVE-2010-0306. • http://secunia.com/advisories/38492 http://www.debian.org/security/2010/dsa-1996 http://www.securityfocus.com/bid/38158 https://bugzilla.redhat.com/show_bug.cgi?id=559091 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11335 https://rhn.redhat.com/errata/RHSA-2010-0088.html https://rhn.redhat.com/errata/RHSA-2010-0095.html https://access.redhat.com/security/cve/CVE-2010-0298 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 7.2EPSS: 0%CPEs: 139EXPL: 3

Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file. Vulnerabilidad de uso anterior a la liberación en la función fasync_helper en fs/fcntl.c en el kernel de Linux anterior a v2.6.33 permite a usuarios locales obtener privilegios a través de vectores que incluyen habilitado O_ASYNC (también conocido como FASYNC o FIOASYNC) sobre un fichero bloqueado, y cerrando después este fichero. • https://www.exploit-db.com/exploits/33523 http://archives.neohapsis.com/archives/fulldisclosure/2010-01/0252.html http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=53281b6d34d44308372d16acb7fb5327609f68b6 http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html http://lock.cmpxchg8b.com/5ebe2294ecd0e0f08eab7690d2a6ee69/create_elf_tables.c http://secunia.com/advisories/38199 http://secunia.com/advisories/39033 http://support.avaya.com/css/P8/documents/10007 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-399: Resource Management Errors •

CVSS: 4.7EPSS: 0%CPEs: 138EXPL: 0

net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application. net/bridge/netfilter/ebtables.c en el módulo ebtables en netfilter framework en el kernel de Linux anterior a v2.6.33-rc4 no requiere de la capacidad CAP_NET_ADMIN para establecer o modificar reglas, lo que permite a usuarios locales evitar las restricciones de acceso establecidas y configurar filtrado de tráfico de red de su elección a través de la aplicación ebtables modificada • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dce766af541f6605fa9889892c0280bab31c66ab http://lists.fedoraproject.org/pipermail/package-announce/2010-January/034250.html http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html http://li • CWE-264: Permissions, Privileges, and Access Controls •