Page 6 of 81 results (0.031 seconds)

CVSS: 4.9EPSS: 0%CPEs: 335EXPL: 0

The fuse_direct_io function in fs/fuse/file.c in the fuse subsystem in the Linux kernel before 2.6.32-rc7 might allow attackers to cause a denial of service (invalid pointer dereference and OOPS) via vectors possibly related to a memory-consumption attack. La funcion fuse_direct_io en fs/fuse/file.c en el subsistema fuse en el kernel de Linux en versiones anteriores a v2.6.32-rc7 podría permitir a atacantes producir una denegación de servicio (desreferencia a puntero no valido y OOPS) a través de vectores que posiblemente estén relacionados con un ataque de agotamiento de memoria. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f60311d5f7670d9539b424e4ed8b5c0872fc9e83 http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html http://secunia.com/advisories/37909 http://secunia.com/advisories/38017 http://support • CWE-399: Resource Management Errors •

CVSS: 7.2EPSS: 0%CPEs: 335EXPL: 0

The collect_rx_frame function in drivers/isdn/hisax/hfc_usb.c in the Linux kernel before 2.6.32-rc7 allows attackers to have an unspecified impact via a crafted HDLC packet that arrives over ISDN and triggers a buffer under-read. La función collect_rx_frame en drivers/isdn/hisax/hfc_usb.c en el kernel Linux anteriores a v2.6.32-rc7 permite a los atacantes tener un impacto no especificado a través de paquetes manipulados HDLC que llegan sobre ISD y lanzan una lectura de búfer por debajo del límite inferior. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=286e633ef0ff5bb63c07b4516665da8004966fec http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00007.html http://secunia. • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.9EPSS: 0%CPEs: 321EXPL: 1

The do_mmap_pgoff function in mm/nommu.c in the Linux kernel before 2.6.31.6, when the CPU lacks a memory management unit, allows local users to cause a denial of service (OOPS) via an application that attempts to allocate a large amount of memory. La función do_mmap_pgoff en mm/nommu.c en el kernel de Linux anteriores a v2.6.31.6, cuando la CPU carece de unidad de gestión de memori, permite a usuarios locales provocar una denegación de servicio (OOPS) mediante una aplicación que intente reservar una gran cantidad de memoria. • https://www.exploit-db.com/exploits/10017 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=89a8640279f8bb78aaf778d1fc5c4a6778f18064 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.31.6 http://www.openwall.com/lists/oss-security/2009/11/09/2 http://www.openwall.com/lists/oss-security/2009/11/13/3 http://www.ubuntu.com/usn/usn-864-1 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 403EXPL: 1

The nfs4_proc_lock function in fs/nfs/nfs4proc.c in the NFSv4 client in the Linux kernel before 2.6.31-rc4 allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) by sending a certain response containing incorrect file attributes, which trigger attempted use of an open file that lacks NFSv4 state. La función nfs4_proc_lock en fs/nfs/nfs4proc.c en el cliente NFSv4 en el Kernel de Linux anteriores a v2.6.31-rc4 permite a servidores NFS remotos provocar una denegación de servicio (desreferenciación de puntero NULL y pánico) si se envía cierta respuesta conteniendo atributos de fichero no correctos, lo que provoca un intento de uso de un fichero abierto que carece de un estado NFSv4. • https://www.exploit-db.com/exploits/10202 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d953126a28f97ec965d23c69fd5795854c048f30 http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00007.html http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00002.html http://lists.opensuse.org/opensuse-security-announce/2009-12/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2010-02/msg00005.html http://lists.vmware.com/pipermail/security-ann • CWE-399: Resource Management Errors CWE-476: NULL Pointer Dereference •

CVSS: 4.6EPSS: 0%CPEs: 410EXPL: 0

The get_instantiation_keyring function in security/keys/keyctl.c in the KEYS subsystem in the Linux kernel before 2.6.32-rc5 does not properly maintain the reference count of a keyring, which allows local users to gain privileges or cause a denial of service (OOPS) via vectors involving calls to this function without specifying a keyring by ID, as demonstrated by a series of keyctl request2 and keyctl list commands. La función get_instantiation_keyring de security/keys/keyctl.c en el subsistema KEYS del kernel de Linux en versiones anteriores a la v2.6.32-rc5 no mantiene apropiadamente la cuenta de referencias de un "keyring", lo que permite a usuarios locales obtener privilegios o provocar una denegación de servicio (OOPS) a través de vectores de ataque que involucran llamadas a esta función sin especificar un "keyring" por ID, como se ha demostrado por series de "keyctl request2" y comandos "keyctl list". • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=21279cfa107af07ef985539ac0de2152b9cba5f5 http://lists.opensuse.org/opensuse-security-announce/2010-01/msg00000.html http://marc.info/?l=oss-security&m=125619420905341&w=2 http://marc.info/?l=oss-security&m=125624091417161&w=2 http://secunia.com/advisories/37086 http://secunia.com/advisories/38017 http://twitter.com/spendergrsec/statuses/4916661870 http://www.kernel.org/pub/linux/kernel/v2.6/testing/ChangeL • CWE-310: Cryptographic Issues •