Page 589 of 3004 results (0.018 seconds)

CVSS: 4.9EPSS: 0%CPEs: 87EXPL: 1

The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules. • http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg http://secunia.com/advisories/19220 http://secunia.com/advisories/20237 http://secunia.com/advisories/20914 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1103 http://www.mandriva.com/security/advisories?name=MDKSA-2006:059 http://www.redhat.com/support/errata/RHSA-2006-0493.html http://www.securityfocus.com/bid/ •

CVSS: 4.9EPSS: 0%CPEs: 59EXPL: 0

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function. • http://marc.info/?l=linux-kernel&m=112323336017157 http://secunia.com/advisories/22292 http://secunia.com/advisories/22945 http://secunia.com/advisories/25714 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://www.debian.org/security/2007/dsa-1304 http://www.redhat.com/support/errata/RHSA-2006-0689.html http://www.securityfocus.com/bid/20362 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345 https://oval.cisecurity.org/repository/search/definition •

CVSS: 4.9EPSS: 0%CPEs: 215EXPL: 0

Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 http://securityreason.com/securityalert/291 http://securitytracker.com/id?1015402 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 http://www.securityfocus.com/bid/16041 http://www.vupen.com/english/advisories/2005/3076 https://exchange.xforce.ibmcloud.com/vulnerabilities/23835 •

CVSS: 2.1EPSS: 0%CPEs: 66EXPL: 0

Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems. • http://kernel.org/git/?p=linux/kernel/git/aegl/linux-2.6.git%3Ba=commitdiff%3Bh=35311d6478077f7bfe35c1c653193e658bf32686 http://kernel.org/git/?p=linux/kernel/git/chrisw/linux-2.6.13.y.git%3Ba=commit%3Bh=98debffa9114b60138b3dbd4d02ce13f01a07ab4 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/17918 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19374 http://www.debian.org/security/ •

CVSS: 3.6EPSS: 0%CPEs: 45EXPL: 0

The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 http://secunia.com/advisories/16747 http://secunia.com/advisories/17073 http://secunia.com/advisories/17918 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.securityfocus.com/archive/1/419522/100/0/threaded htt • CWE-264: Permissions, Privileges, and Access Controls •