Page 593 of 2995 results (0.025 seconds)

CVSS: 4.9EPSS: 0%CPEs: 72EXPL: 0

Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests. • http://linux.bkbits.net:8080/linux-2.6/cset%404182a613oVsK0-8eCWpyYFrUf8rhLA http://secunia.com/advisories/21605 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http://www.debian.org/security/2006/dsa-1184 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10 http://www.redhat.com/support/errata/RHSA-2006-0617.html http://www.securityfocus.com/bid/19665 https://oval.cisecurity. •

CVSS: 1.2EPSS: 0%CPEs: 32EXPL: 0

Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://secunia.com/advisories/18684 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19607 http://secunia.com/advisories/21476 http://www.debian.org/security/2006/dsa-1018 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandriva.com/security/advisories?name=MDKS •

CVSS: 6.4EPSS: 0%CPEs: 32EXPL: 0

Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. • http://secunia.com/advisories/17002 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 https://bugzilla.fedora.us/show_bug.cgi?id=2336 https://exchange.xforce.ibmcloud.com/vulnerabilities/15972 https://oval.cisecurity.org/repository/search/definition/oval •

CVSS: 2.1EPSS: 0%CPEs: 104EXPL: 1

Integer overflow in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (kernel crash) via a cmsg_len that contains a -1, which leads to a buffer overflow. • http://marc.info/?l=bugtraq&m=110383108211524&w=2 http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html http://www.securityfocus.com/bid/11956 http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18522 •

CVSS: 2.1EPSS: 0%CPEs: 104EXPL: 2

Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function. • https://www.exploit-db.com/exploits/692 http://marc.info/?l=bugtraq&m=110383108211524&w=2 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html http:// •