Page 608 of 3884 results (0.015 seconds)

CVSS: 5.9EPSS: 1%CPEs: 1EXPL: 1

net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data. net/sctp/sm_make_chunk.c del kernel de Linux en versiones anteriores a 2.6.34, si se utiliza addip_enable y auth_enable, no considera la cantidad de "padding" durante el cálculo de la longitud para los segmentos ("chunks")(1) INIT y (2) INIT ACK, lo que permite a atacantes remotos provocar una denegación de servicio (OOPS) a través de paquetes modificados. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8170c35e738d62e9919ce5b109cf4ed66e95bde http://mirror.anl.gov/pub/linux/kernel/v2.6/ChangeLog-2.6.34 http://openwall.com/lists/oss-security/2011/04/11/12 http://openwall.com/lists/oss-security/2011/04/11/4 http://rhn.redhat.com/errata/RHSA-2011-0927.html https://bugzilla.redhat.com/show_bug.cgi?id=695383 https://access.redhat.com/security/cve/CVE-2011-1573 • CWE-682: Incorrect Calculation •

CVSS: 4.9EPSS: 0%CPEs: 6EXPL: 0

The inet_diag_bc_audit function in net/ipv4/inet_diag.c in the Linux kernel before 2.6.39.3 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message, as demonstrated by an INET_DIAG_BC_JMP instruction with a zero yes value, a different vulnerability than CVE-2010-3880. La función net_diag_bc_audit en net/ipv4/inet_diag.c en el Kernel de Linux anterior a v2.6.39.3 no audita adecuadamente bytecode INET_DIAG, lo que permite a usuarios locales provocar una denegación de servicio a través de instrucciones manipuladas INET_DIAG_REQ_BYTECODE en un mensaje netlink, como se demostró por una instrucción INET_DIAG_BC_JMP con un valor zero yes, una vulnerabilidad diferente que CVE-2010-3880. • http://article.gmane.org/gmane.linux.network/197206 http://article.gmane.org/gmane.linux.network/197208 http://article.gmane.org/gmane.linux.network/197386 http://article.gmane.org/gmane.linux.network/198809 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eeb1497277d6b1a0a34ed36b97e18f2bd7d6de0d http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://patchwork.ozlabs.org/patch/100857 http://rhn.redhat.com/errata/RHSA-2011-0927.html http://www.kern • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

The Linux kernel before 2.6.39 does not properly create transparent huge pages in response to a MAP_PRIVATE mmap system call on /dev/zero, which allows local users to cause a denial of service (system crash) via a crafted application. El kernel de Linux anterior a v2.6.39 no crea correctamente páginas grandes en respuesta a una llamada al sistema mmap MAP_PRIVATE en /dev/zero, permitiendo a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una aplicación especialmente diseñada. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=78f11a255749d09025f54d4e2df4fbcb031530e2 http://www.openwall.com/lists/oss-security/2011/06/20/14 https://bugzilla.redhat.com/show_bug.cgi?id=714761 https://github.com/torvalds/linux/commit/78f11a255749d09025f54d4e2df4fbcb031530e2 https://access.redhat.com/security/cve/CVE-2011-2479 • CWE-399: Resource Management Errors •

CVSS: 5.4EPSS: 0%CPEs: 21EXPL: 1

The tunnels implementation in the Linux kernel before 2.6.34, when tunnel functionality is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading. La implementación de túneles ("tunnels") del kernel de Linux en versiones anteriores a la 2.6.34, si la funcionalidad de túneles está configurada como módulo, permite a atacantes remotos provocar una denegación de servicio (OOPS) enviando un paquete durante la carga del módulo. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978 http://www.openwall.com/lists/oss-security/2011/05/05/6 https://bugzilla.redhat.com/show_bug.cgi?id=702303 https://github.com/torvalds/linux/commit/d5aa407f59f5b83d2c50ec88f5bf56d40f1f8978 https://access.redhat.com/security/cve/CVE-2011-1768 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 5.4EPSS: 0%CPEs: 21EXPL: 1

net/ipv4/ip_gre.c in the Linux kernel before 2.6.34, when ip_gre is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading. net/ipv4/ip_gre.c del kernel de Linux en versiones anteriores a la 2.6.34, si ip_gre es configurado como módulo, permite a atacantes remotos provocar una denegación de servicio (OOPS) enviando un paquete durante la carga del módulo. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2892f02712e9516d72841d5c019ed6916329794 http://www.openwall.com/lists/oss-security/2011/05/05/6 https://bugzilla.redhat.com/show_bug.cgi?id=702303 https://github.com/torvalds/linux/commit/c2892f02712e9516d72841d5c019ed6916329794 https://access.redhat.com/security/cve/CVE-2011-1767 •