Page 555 of 2833 results (0.014 seconds)

CVSS: 4.9EPSS: 0%CPEs: 87EXPL: 1

The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules. • http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg http://secunia.com/advisories/19220 http://secunia.com/advisories/20237 http://secunia.com/advisories/20914 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1103 http://www.mandriva.com/security/advisories?name=MDKSA-2006:059 http://www.redhat.com/support/errata/RHSA-2006-0493.html http://www.securityfocus.com/bid/ •

CVSS: 4.9EPSS: 0%CPEs: 215EXPL: 0

Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 http://securityreason.com/securityalert/291 http://securitytracker.com/id?1015402 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 http://www.securityfocus.com/bid/16041 http://www.vupen.com/english/advisories/2005/3076 https://exchange.xforce.ibmcloud.com/vulnerabilities/23835 •

CVSS: 2.1EPSS: 0%CPEs: 66EXPL: 0

Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems. • http://kernel.org/git/?p=linux/kernel/git/aegl/linux-2.6.git%3Ba=commitdiff%3Bh=35311d6478077f7bfe35c1c653193e658bf32686 http://kernel.org/git/?p=linux/kernel/git/chrisw/linux-2.6.13.y.git%3Ba=commit%3Bh=98debffa9114b60138b3dbd4d02ce13f01a07ab4 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/17918 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19374 http://www.debian.org/security/ •

CVSS: 3.6EPSS: 0%CPEs: 45EXPL: 0

The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 http://secunia.com/advisories/16747 http://secunia.com/advisories/17073 http://secunia.com/advisories/17918 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.securityfocus.com/archive/1/419522/100/0/threaded htt • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.6EPSS: 0%CPEs: 42EXPL: 0

Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 http://secunia.com/advisories/16747 http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/17826 http://secunia.com/advisories/17918 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.mandriva.com/ •