Page 644 of 6548 results (0.018 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

19 Feb 2004 — dm-crypt on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption. • http://marc.info/?l=linux-kernel&m=107719798631935&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 56EXPL: 0

19 Feb 2004 — Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges. Vulnerabilidad desconocida en la función ncp_lookup de ncpfs en Red Hat Enterprese Linux 2.1 permite a usuarios locales ganar privilegios. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

17 Feb 2004 — Unknown vulnerability in the eflags checking in the 32-bit ptrace emulation for the Linux kernel on AMD64 systems allows local users to gain privileges. Vulnerabilidad desconocida en la comprobación de eflags en la emulación de 32 bits del kernel de Linux para sistemas AMD64 permite a usuarios locales ganar privilegios. • http://security.gentoo.org/glsa/glsa-200402-06.xml •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

03 Feb 2004 — Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking." Vulnerabilidad desconocida en el kernel de Linux anterior a 2.4.22 permite a usuarios locales ganar privilegios, relacionada con "comprobación de límites R128 DRI". • http://secunia.com/advisories/10782 •

CVSS: 7.8EPSS: 0%CPEs: 54EXPL: 4

20 Jan 2004 — The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. La llamada de sistema mremap (do_mremap) en Linux kernel 2.2, 2.4 y 2.6 y posiblemente otras versiones anteriores a 2.4.24, no realiza adecuadam... • https://www.exploit-db.com/exploits/141 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

15 Jan 2004 — Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file. Antivir / Linux 2.0.9-9, y posiblemente versiones anteriores, permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en el fichero temporal .pid_antivir_$$ • http://marc.info/?l=bugtraq&m=107402026023763&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 2

31 Dec 2003 — exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function. • http://www.securityfocus.com/bid/8987 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

31 Dec 2003 — Multiple race conditions in the handling of O_DIRECT in Linux kernel prior to version 2.4.22 could cause stale data to be returned from the disk when handling sparse files, or cause incorrect data to be returned when a file is truncated as it is being read, which might allow local users to obtain sensitive data that was originally owned by other users, a different vulnerability than CVE-2003-0018. • http://linux.bkbits.net:8080/linux-2.4/cset%403ef33d95ym_22QH2xwhDMt264M55Fg •

CVSS: 5.5EPSS: 0%CPEs: 42EXPL: 0

31 Dec 2003 — Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service. • http://linux.bkbits.net:8080/linux-2.4/cset%403fdd54b3u9Eq0Wny2Nn1HGfI3pofOQ •

CVSS: 10.0EPSS: 0%CPEs: 48EXPL: 0

31 Dec 2003 — Multiple integer overflows in the 32bit emulation for AMD64 architectures in Linux 2.4 kernel before 2.4.21 allows attackers to cause a denial of service or gain root privileges via unspecified vectors that trigger copy_from_user function calls with improper length arguments. • http://linux.bkbits.net:8080/linux-2.4/cset%403ed382f7UfJ9Q2LKCJq1Tc5B7-EC5A •