Page 596 of 3011 results (0.037 seconds)

CVSS: 6.2EPSS: 0%CPEs: 147EXPL: 4

Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor. Condición de carrera en las llamadas de funciones (1) load_elf_library y (2) binfmt_aout de uselib de los kernel de Linux 2.4 a 2.429-rc2 y 2.6 a 2.6.10 permite a usuarios locales ejecutar código de su elección manipulando el descriptor WMA. • https://www.exploit-db.com/exploits/778 https://www.exploit-db.com/exploits/744 https://www.exploit-db.com/exploits/895 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0021-uselib.txt http://marc.info/?l=bugtraq&m=110512575901427&w=2 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security •

CVSS: 4.9EPSS: 0%CPEs: 72EXPL: 0

Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests. • http://linux.bkbits.net:8080/linux-2.6/cset%404182a613oVsK0-8eCWpyYFrUf8rhLA http://secunia.com/advisories/21605 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http://www.debian.org/security/2006/dsa-1184 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10 http://www.redhat.com/support/errata/RHSA-2006-0617.html http://www.securityfocus.com/bid/19665 https://oval.cisecurity. •

CVSS: 1.2EPSS: 0%CPEs: 32EXPL: 0

Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://secunia.com/advisories/18684 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19607 http://secunia.com/advisories/21476 http://www.debian.org/security/2006/dsa-1018 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandriva.com/security/advisories?name=MDKS •

CVSS: 6.4EPSS: 0%CPEs: 32EXPL: 0

Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. • http://secunia.com/advisories/17002 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 https://bugzilla.fedora.us/show_bug.cgi?id=2336 https://exchange.xforce.ibmcloud.com/vulnerabilities/15972 https://oval.cisecurity.org/repository/search/definition/oval •

CVSS: 2.1EPSS: 0%CPEs: 104EXPL: 1

Integer overflow in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (kernel crash) via a cmsg_len that contains a -1, which leads to a buffer overflow. • http://marc.info/?l=bugtraq&m=110383108211524&w=2 http://www.guninski.com/where_do_you_want_billg_to_go_today_2.html http://www.securityfocus.com/bid/11956 http://www.securitytrap.com/mail/full-disclosure/2004/Dec/0323.html https://exchange.xforce.ibmcloud.com/vulnerabilities/18522 •