Page 569 of 5730 results (0.019 seconds)

CVSS: 7.8EPSS: 0%CPEs: 92EXPL: 0

11 Jul 2005 — Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 9.1EPSS: 0%CPEs: 29EXPL: 1

17 May 2005 — Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html •

CVSS: 7.8EPSS: 0%CPEs: 129EXPL: 1

11 May 2005 — The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 •

CVSS: 7.5EPSS: 0%CPEs: 34EXPL: 0

02 May 2005 — The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow attackers to cause a denial of service (oops) via SMP. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.8 •

CVSS: 7.2EPSS: 0%CPEs: 259EXPL: 0

01 Apr 2005 — The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVSS: 7.5EPSS: 0%CPEs: 247EXPL: 2

20 Mar 2005 — Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem. • https://www.exploit-db.com/exploits/25234 •

CVSS: 7.5EPSS: 0%CPEs: 183EXPL: 0

09 Mar 2005 — Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 •

CVSS: 9.8EPSS: 0%CPEs: 208EXPL: 0

22 Feb 2005 — Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 107EXPL: 0

22 Feb 2005 — Some futex functions in futex.c for Linux kernel 2.6.x perform get_user calls while holding the mmap_sem semaphore, which could allow local users to cause a deadlock condition in do_page_fault by triggering get_user faults while another thread is executing mmap or other functions. • http://linux.bkbits.net:8080/linux-2.6/cset%40421cfc11zFsK9gxvSJ2t__FCmuUd3Q •

CVSS: 9.1EPSS: 0%CPEs: 280EXPL: 0

16 Feb 2005 — Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •