Page 625 of 6713 results (0.045 seconds)

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device. drivers/hid/hid-ntrig.c en el subsistema Human Interface Device (HID) del kernel Linux hasta 3.11, cuando CONFIG_HID_NTRIG es activado, permite a atacantes con acceso físico causar una denegación de servicio (referencia a puntero nulo y OOPS) a trav... • http://marc.info/?l=linux-input&m=137772189314633&w=1 • CWE-476: NULL Pointer Dereference •

CVSS: 5.5EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. El driver en el subsistema del Interfaz de Dispositivo Humano (HID) en el núcleo de Linux hasta 3.11 cuando es habilitada CONFIG_HID_LENOVO_TPKBD permite a atacantes físicos causar denegación de servicio (escritura fuera de rango en memor... • http://marc.info/?l=linux-input&m=137772187514628&w=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.1EPSS: 0%CPEs: 259EXPL: 0

13 Sep 2013 — drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-sensor-hub.c en el subsistema Human Interface Device (HID) en el kernel de Linux hasta la v3.11, cuando CONFIG_HID_SENSOR_HUB es activado, permite a atacantes físicamente próximos obtener información sensible de la memoria del núcleo a t... • http://marc.info/?l=linux-input&m=137772191114645&w=1 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 255EXPL: 1

06 Sep 2013 — The dispatch_discard_io function in drivers/block/xen-blkback/blkback.c in the Xen blkback implementation in the Linux kernel before 3.10.5 allows guest OS users to cause a denial of service (data loss) via filesystem write operations on a read-only disk that supports the (1) BLKIF_OP_DISCARD (aka discard or TRIM) or (2) SCSI UNMAP feature. La función dispatch_discard_io en drivers/block/xen-blkback/blkback.c en la implementación Xen blkback en el kernel de Linux anterior a v3.10.5 permite a usuarios invita... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=604c499cbbcc3d5fe5fb8d53306aa0fae1990109 • CWE-20: Improper Input Validation •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 0

25 Aug 2013 — The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel before 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a software event. La función validate_event en arch/arm/kernel/perf_event.c en Linux kernel anterior a v3.10.8 en plataformas ARM permite a usuarios locales conseguir privilegios o causar una denegación de servicio (referencia a un pun... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c95eb3184ea1a3a2551df57190c81da695e2144b • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 5EXPL: 1

25 Aug 2013 — The bad_mode function in arch/arm64/kernel/traps.c in the Linux kernel before 3.9.5 on the ARM64 platform allows local users to cause a denial of service (system crash) via vectors involving an attempted register access that triggers an unexpected value in the Exception Syndrome Register (ESR). La función bad_mode en arch/arm64/kernel/traps.c en Linux kernel anterior a v3.9.5 en plataformas ARM64 permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de vectores relacion... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9955ac47f4ba1c95ecb6092aeaefb40a22e99268 •

CVSS: 5.5EPSS: 0%CPEs: 251EXPL: 1

25 Aug 2013 — Memory leak in the unshare_userns function in kernel/user_namespace.c in the Linux kernel before 3.10.6 allows local users to cause a denial of service (memory consumption) via an invalid CLONE_NEWUSER unshare call. Fuga de memoria en la función unshare_userns en kernel/user_namespace.c en Linux kernel anterior a 3.10.6 permite a usuarios locales provocar una denegación de servicio (consumo de memoria) a través de una llamada de liberación invalida CLONE_NEWUSER. Vince Weaver discovered a flaw in the perf s... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6160968cee8b90a5dd95318d716e31d7775c4ef3 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

20 Aug 2013 — Off-by-one error in the build_unc_path_to_root function in fs/cifs/connect.c in the Linux kernel before 3.9.6 allows remote attackers to cause a denial of service (memory corruption and system crash) via a DFS share mount operation that triggers use of an unexpected DFS referral name length. Error de superación de límite (off-by-one) en la función build_unc_path_to_root en fs/cifs/connect.c en Linux kernel anterior a v3.9.6 permite a atacantes remotos provocar una denegación de servicio (corrupción de memor... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1fc29bacedeabb278080e31bb9c1ecb49f143c3b • CWE-189: Numeric Errors •

CVSS: 5.5EPSS: 0%CPEs: 248EXPL: 1

28 Jul 2013 — The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call. La función ip6_append_data_mtu en net/ipv6/ip6_output.c en la implementación IPv6 en el kernel de Linux hasta la 3.10.3, no ma... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=75a493e60ac4bbe2e977e7129d6d8cbb0dd236be • CWE-399: Resource Management Errors •

CVSS: 7.1EPSS: 0%CPEs: 248EXPL: 0

28 Jul 2013 — The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call. La función udp_v6_push_pending_frames en net/ipv6/udp.c en la implementación IPv6 en el kernel de Linux hasta la 3.10.3, realiza una llamada a funciones incorrecta para datos pend... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8822b64a0fa64a5dd1dfcf837c5b0be83f8c05d1 • CWE-399: Resource Management Errors •