Page 552 of 2833 results (0.044 seconds)

CVSS: 7.5EPSS: 2%CPEs: 78EXPL: 0

Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21745 http://secunia.com/advisories/22093 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1184 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.osvdb.org/25747 http://www.redhat.com/support •

CVSS: 4.9EPSS: 0%CPEs: 105EXPL: 0

Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ http://marc.info/?l=linux-scsi&m=112540053711489&w=2 http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21555 http://secunia.com/advisories/21745 http://secunia.com/advisories/ • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 148EXPL: 0

The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process. La lógica selinux_ptrace en hooks.c en SELinux para Linux 2.6.6 permite a usuarios locales con permisos ptrace cambiar el trazador SID a un SID de otro proceso. • http://marc.info/?l=git-commits-head&m=114210002712363&w=2 http://marc.info/?l=selinux&m=114226465106131&w=2 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/21465 http://secunia.com/advisories/22093 http://secunia.com/advisories/22417 http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006&#x •

CVSS: 2.1EPSS: 0%CPEs: 157EXPL: 0

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 http://secunia.com/advisories/20157 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/22292 http://secunia.com/advisories/22497 http://secunia.com/advisories/22875 http://secunia.com/advisories/22945 http://secunia.com/advisories/23064 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm ht •

CVSS: 2.1EPSS: 0%CPEs: 143EXPL: 0

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels. El kernel de Linux en versiones anteriores a 2.6.16.9 y el kernel de FreeBSD, cuando se ejecuta en AMD64 y otros procesadores AuthenticAMD de 7ª y 8ª generación, solo guarda/restablece los registros FOP, FIP y FDP x87 en FXSAVE/FXRSTOR cuando una excepción está pendiente, lo que permite un proceso para determinar las porciones del estado de instrucciones de punto flotante de otros procesos, lo que puede ser aprovechado para obtener información sensible como claves criptográficas. NOTA: este es un comportamiento documentado de procesadores AMD64, pero es inconsistente con procesadores Intel en una forma relevante para la seguridad que no fue abordada por los kernels. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc http://kb.vmware.com/kb/2533126 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9 http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lwn.net/Alerts/180820 http://marc.info/?l=linux-kernel&m=114548768214478&w=2 http://secunia.com/advisories/19715 http://secunia.com/advisories/19724 http://secunia.com/advisories/19735 http://secunia.com/advisories& • CWE-310: Cryptographic Issues •