Page 549 of 2833 results (0.062 seconds)

CVSS: 4.0EPSS: 0%CPEs: 211EXPL: 0

The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs. La función zlib_inflate en el núcleo de Linux 2.6.x permite a usuarios locales provocar una denegación de servicio (caída) mediante un sistema de ficheros mal formado que utiliza compresión zlib que provoca una corrupción de memoria, como se ha demostrado utilizando cramfs. • http://projects.info-pull.com/mokb/MOKB-07-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://rhn.redhat.com/errata/RHSA-2007-0436.html http://secunia.com/advisories/22767 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/24259 http://secunia.com/advisories/24482 http://secunia.com/advisories/25630 http://secunia.com/advisori •

CVSS: 1.2EPSS: 0%CPEs: 105EXPL: 2

Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures. Condición de carrera en la función __find_get_block_slow en el sistema de ficheros ISO9660 en Linux 2.6.18 y posiblemente otras versiones permite a usuarios locales provocar una denegación de servicio (bucle infinito) montando un sistema de fisheros ISO9660 manipulado que contiene estructuras de datos mal formadas. • https://www.exploit-db.com/exploits/28912 http://projects.info-pull.com/mokb/MOKB-05-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22702 http://secunia.com/advisories/22746 http://secunia.com/advisories/23474 http://secunia.com/advisories/23593 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/25691&# • CWE-17: DEPRECATED: Code CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 107EXPL: 4

Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem. Vulnerabilidad doble-libre en módulo squashfs en el kernel de Linux 2.6.x, tal y como se usa en Fedora Core 5 y posiblemente otras distribuciones, permite a un usuario local provocar denegación de servicio a través del montado manipualado del sistema de ficheros. • https://www.exploit-db.com/exploits/28895 http://projects.info-pull.com/mokb/MOKB-02-11-2006.html http://secunia.com/advisories/22655 http://secunia.com/advisories/23361 http://secunia.com/advisories/23384 http://secunia.com/advisories/24259 http://www.mandriva.com/security/advisories?name=MDKSA-2007:047 http://www.securityfocus.com/bid/20870 http://www.ubuntu.com/usn/usn-395-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/29967 •

CVSS: 2.1EPSS: 0%CPEs: 106EXPL: 0

The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked. La función __block_prepare_write en fs/buffer.c para Linux kernel 2.6.x anteriores a 2.6.13 no limpia correctamente los búferes durante ciertas condiciones de error, que permite a usuarios locales leer porciones de ficheros que han sido desvinculados. • http://osvdb.org/31376 http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/23370 http://secunia.com/advisories/23384 http://secunia.com/advisories/23474 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24206 http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=152becd26e0563aefdbc4fd1fe491928efe92d1f http:/ •

CVSS: 4.9EPSS: 0%CPEs: 285EXPL: 0

The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption). La llamada al sistema perfmonctl (sys_perfmonctl) en el núcleo Linux 2.4.x y 2.6 anterior a 2.6.18, cuando se ejecuta en sistemas Itanium, no lleva correctamente la cuenta de referencias a los descriptores de fichero, lo que permite a usuarios locales provocar una denegación de servicio (agotamiento de descriptores de fichero). • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204360 http://secunia.com/advisories/22279 http://secunia.com/advisories/22292 http://secunia.com/advisories/22382 http://secunia.com/advisories/22945 http://secunia.com/advisories/23370 http://secunia.com/advisories/23474 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b8444d00762703e1b6146fce12ce2684885f8bf6 http://www.mandriva.com/ •