Page 595 of 3011 results (0.019 seconds)

CVSS: 1.2EPSS: 0%CPEs: 107EXPL: 0

Some futex functions in futex.c for Linux kernel 2.6.x perform get_user calls while holding the mmap_sem semaphore, which could allow local users to cause a deadlock condition in do_page_fault by triggering get_user faults while another thread is executing mmap or other functions. • http://linux.bkbits.net:8080/linux-2.6/cset%40421cfc11zFsK9gxvSJ2t__FCmuUd3Q http://lkml.org/lkml/2005/2/22/123 http://www.redhat.com/support/errata/RHSA-2005-420.html http://www.securityfocus.com/archive/1/427980/100/0/threaded https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10037 https://access.redhat.com/security/cve/CVE-2005-0937 https://bugzilla.redhat.com/show_bug.cgi?id=1617588 •

CVSS: 6.2EPSS: 0%CPEs: 280EXPL: 0

Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A http://marc.info/?l=full-disclosure&m=110846102231365&w=2 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/bid/12598 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647 https://access.redhat.com/security/cve/CVE-2005-0178 https://bugzilla.redhat.com/show_bug.cgi? •

CVSS: 3.6EPSS: 0%CPEs: 46EXPL: 1

Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html http://secunia.com/advisories/17826 http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.securityfocus.com/archive/1/386374 http://www.securityfocus.com/bid/12198 https://oval.cisecurity.org/re •

CVSS: 2.1EPSS: 0%CPEs: 122EXPL: 0

Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html http://secunia.com/advisories/17002 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9890 https://access.redhat.com/security/cve/CVE-2005 •

CVSS: 2.1EPSS: 0%CPEs: 112EXPL: 0

Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors. Vulnerabilidad desconocida en el código de filtrado de llamada al sistema en el subsistema de auditoría de Red Hat Enterprise Linux 3 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante vectores de ataque desconocidos. • http://www.redhat.com/support/errata/RHSA-2005-043.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11282 https://access.redhat.com/security/cve/CVE-2004-1237 https://bugzilla.redhat.com/show_bug.cgi?id=1617399 •