Page 583 of 2995 results (0.023 seconds)

CVSS: 2.1EPSS: 0%CPEs: 113EXPL: 0

The strnlen_user function in Linux kernel before 2.6.16 on IBM S/390 can return an incorrect value, which allows local users to cause a denial of service via unknown vectors. La función strnlen_user en el kernel Linux anterior a la versión 2.6.16 en IBM S/390 puede devolver un valor incorrecto, lo que permite a usuarios locales provocar una denegación de servicio mediante vectores desconocidos. • http://secunia.com/advisories/20914 http://secunia.com/advisories/21465 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=331c46591414f7f92b1cec048009abe89892ee79 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=331c46591414f7f92b1cec048009abe89892ee79 http://www.kernel.org/pub&# •

CVSS: 5.6EPSS: 1%CPEs: 138EXPL: 0

Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c). kernel de Linux anterior a v2.6.16.21 y v2.6.17, cuando se ejecuta en PowerPC, no realiza correctamente ciertas comprobaciones requeridas access_ok, que permite a usuarios locales leer memoria del kernel de su elección en sistemas 64-bit (signal_64.c) y provoca una denegación de servicio (caída) y posibilita leer memorial del kernet en sistemas 32-bit (signal_32.c). • http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c85d1f9d358b24c5b05c3a2783a78423775a080 http://www.kernel.org/pub/linux/kernel/v2.6 •

CVSS: 7.8EPSS: 5%CPEs: 148EXPL: 0

xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length. xt_sctp en netfilter para el kernel Linux anterior a v2.6.17.1 permite a atacantes provocar una denegación de servivio (bucle infinito) a través de un fragmento SCTP con longitud 0 (cero). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.1 http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://securitytracker.com/id?1016347 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.novell.com/linux/security/advisories/2006_42_kernel.html http://www.novell.com/linux/security/advisories/2006_47_kernel.html&# •

CVSS: 4.0EPSS: 1%CPEs: 139EXPL: 0

Race condition in run_posix_cpu_timers in Linux kernel before 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting. Condición de carrera en run_posix_cpu_timers en el kernel Linux anterior a v2.6.16.21 permite a usuarios locales provocar una denegación de servicio (caída BUG_ON) provocando que una CPU asocie un temporizador a un proceso que está saliendo. • http://marc.info/?l=linux-kernel&m=115015841413687 http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=30f1e3dd8c72abda343bcf415f7d8894a02b4290 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21 http://www.mandriva.com/security/advisories?name=MDKSA-2006:12 •

CVSS: 7.8EPSS: 87%CPEs: 172EXPL: 1

The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.18 http://secunia.com/advisories/20182 http://secunia.com/advisories/20225 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/21136 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/21983 http://secunia.com/advisories/22082 http:&#x •