Page 565 of 5730 results (0.034 seconds)

CVSS: 5.5EPSS: 0%CPEs: 285EXPL: 0

09 Oct 2006 — The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption). La llamada al sistema perfmonctl (sys_perfmonctl) en el núcleo Linux 2.4.x y 2.6 anterior a 2.6.18, cuando se ejecuta en sistemas Itanium, no lleva correctamente la cuenta de referencias a los descriptores de fichero, lo que permite a usua... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204360 •

CVSS: 7.1EPSS: 0%CPEs: 201EXPL: 0

05 Oct 2006 — The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. La función copy_from_user en el código uaccess en Linux kernel 2.6 anterior a 2.6.19-rc1, cuando funciona sobre s390, no correctamente claro un búfe... • http://lkml.org/lkml/2006/11/5/46 •

CVSS: 7.8EPSS: 43%CPEs: 191EXPL: 1

18 Jul 2006 — Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only. Linux kernel 2.6.x, cuando utiliza NFS y EXT3, permite a atacantes remotos provocar denegación de servicio (panic en el sistema de archivos) a través de paquetes UDP manipulados con un procedimiento de bú... • https://www.exploit-db.com/exploits/28358 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

05 Jul 2006 — The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow. La función dvd_read_bca en el código de manejo de los DVD en el fichero drivers/cdrom/cdrom.c del kernel de Linux v2.2.16 y posteriores, asigna un valor incorrecto a la variable "length" (longitud), lo que permite a usuarios loca... • http://bugzilla.kernel.org/show_bug.cgi?id=2966 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.5EPSS: 0%CPEs: 113EXPL: 0

27 Jun 2006 — The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors. La función strnlen_user en el kernel Linux anterior a la versión 2.6.16 en IBM S/390 puede devolver un valor incorrecto, lo que permite a usuarios locales provocar una denegación de servicio mediante vectores desconocidos. • http://secunia.com/advisories/20914 •

CVSS: 4.7EPSS: 1%CPEs: 139EXPL: 0

23 Jun 2006 — Race condition in run_posix_cpu_timers in Linux kernel before 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting. Condición de carrera en run_posix_cpu_timers en el kernel Linux anterior a v2.6.16.21 permite a usuarios locales provocar una denegación de servicio (caída BUG_ON) provocando que una CPU asocie un temporizador a un proceso que está saliendo. • http://marc.info/?l=linux-kernel&m=115015841413687 •

CVSS: 7.1EPSS: 2%CPEs: 138EXPL: 0

23 Jun 2006 — Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c). kernel de Linux anterior a v2.6.16.21 y v2.6.17, cuando se ejecuta en PowerPC, no realiza correctamente ciertas comprobaciones requeridas access_ok, que permite a usuarios locales leer memoria del kern... • http://secunia.com/advisories/20703 •

CVSS: 7.8EPSS: 2%CPEs: 148EXPL: 0

23 Jun 2006 — xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length. xt_sctp en netfilter para el kernel Linux anterior a v2.6.17.1 permite a atacantes provocar una denegación de servivio (bucle infinito) a través de un fragmento SCTP con longitud 0 (cero). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.1 •

CVSS: 7.8EPSS: 90%CPEs: 172EXPL: 1

25 May 2006 — The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 •

CVSS: 9.1EPSS: 10%CPEs: 135EXPL: 0

22 May 2006 — Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •