Page 590 of 2995 results (0.022 seconds)

CVSS: 4.6EPSS: 0%CPEs: 65EXPL: 0

Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c. • http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/17826 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/security/2006/dsa-1018 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6fc0b4a7a73a81e74d0004732df358f4f9975be2 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 3.7EPSS: 0%CPEs: 92EXPL: 0

Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://marc.info/?l=bugtraq&m=112110120216116&w=2 http://secunia.com/advisories/15980 http://secunia.com/advisories/17002 http://secunia.com/advisories/18059 http://secunia.com/advisories/19185 http://secunia.com/advisories/19607 http://securitytracker.com/id?1014442 http://www.debian.org/security/2005/dsa-921 http://www.novell.com/linux/security/advisories/2005_44_kernel.html http://www.redhat.com •

CVSS: 7.2EPSS: 0%CPEs: 29EXPL: 1

Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0046.html http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.10 http://marc.info/?l=linux-kernel&m=111630512512222 http://www.redhat.com/support/errata/RHSA-2005-420.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/bid/13651 http://www.vupen.com/english/advisories/2005/0557 https://oval.cisec •

CVSS: 7.2EPSS: 0%CPEs: 129EXPL: 1

The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://secunia.com/advisories/19185 http://secunia.com/advisories/19607 http://www.isec.pl/vulnerabilities/isec-0023-coredump.txt http://www.redhat.com/support/errata/RHSA-2005-472.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.securityfocus.com/archive/1/397966 http://www.secur •

CVSS: 1.2EPSS: 0%CPEs: 34EXPL: 0

The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow attackers to cause a denial of service (oops) via SMP. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.8 http://linux.bkbits.net:8080/linux-2.6/cset%40423078fafVa6mAyny23YZ87hDipmTw http://www.securityfocus.com/archive/1/427980/100/0/threaded •