Page 670 of 3822 results (0.024 seconds)

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c. El subsistema Human Interface Device (HID) en el núcleo de Linux hasta v3.11, cuando CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, o CONFIG_LOGIWHEELS_FF esta habilitado, permite a los atacantes físicamente próximos a provocar una denegación de servicio (escritura fuera de rango en la memoria dinámica) a través de un dispositivo manipulado, relacionado con (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, y (3) drivers/hid/hid-lg4ff.c. • http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html http://marc.info/?l=linux-input&m=137772186714627&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://www.securityfocus.com/bid/62050 http://www.ubuntu.com/usn/USN-2015-1 http://www.ubuntu.com/usn/USN-2016-1 http://www.ubuntu.com/usn/USN-2019-1 htt • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. drivers/hid/hid-pl.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta v3.11, cuando CONFIG_HID_PANTHERLORD está activo, permite a atacantes físicamente próximos causar denegación de servicio (escritura fuera de límites basada en memoria dinámica) a través de un dispositivo manipulado. • http://marc.info/?l=linux-input&m=137772185414625&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://rhn.redhat.com/errata/RHSA-2013-1645.html http://www.debian.org/security/2013/dsa-2766 http://www.securityfocus.com/bid/62049 http://www.ubuntu.com/usn/USN-1976-1 http://www.ubuntu.com/usn/USN-1977-1 http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •

CVSS: 1.9EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-sensor-hub.c en el subsistema Human Interface Device (HID) en el kernel de Linux hasta la v3.11, cuando CONFIG_HID_SENSOR_HUB es activado, permite a atacantes físicamente próximos obtener información sensible de la memoria del núcleo a través de un dispositivo manipulado. • http://marc.info/?l=linux-input&m=137772191114645&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 • CWE-20: Improper Input Validation •

CVSS: 3.8EPSS: 0%CPEs: 255EXPL: 1

The dispatch_discard_io function in drivers/block/xen-blkback/blkback.c in the Xen blkback implementation in the Linux kernel before 3.10.5 allows guest OS users to cause a denial of service (data loss) via filesystem write operations on a read-only disk that supports the (1) BLKIF_OP_DISCARD (aka discard or TRIM) or (2) SCSI UNMAP feature. La función dispatch_discard_io en drivers/block/xen-blkback/blkback.c en la implementación Xen blkback en el kernel de Linux anterior a v3.10.5 permite a usuarios invitados del sistema operativo provocar una denegación de servicio (pérdida de datos) a través de operaciones de escritura del sistema de ficheros en un disco de sólo lectura que soporte la funcionalidad BLKIF_OP_DISCARD (aka discard o TRIM) o SCSI UNMAP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=604c499cbbcc3d5fe5fb8d53306aa0fae1990109 http://people.canonical.com/~ubuntu-security/cve/2013/CVE-2013-2140.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.5 http://www.openwall.com/lists/oss-security/2013/06/05/21 http://www.ubuntu.com/usn/USN-1938-1 http://www.ubuntu.com/usn/USN-1943-1 http://www.ubuntu.com/usn/USN-1944-1 http://www.ubuntu.com/usn/USN • CWE-20: Improper Input Validation •

CVSS: 4.7EPSS: 0%CPEs: 251EXPL: 1

Memory leak in the unshare_userns function in kernel/user_namespace.c in the Linux kernel before 3.10.6 allows local users to cause a denial of service (memory consumption) via an invalid CLONE_NEWUSER unshare call. Fuga de memoria en la función unshare_userns en kernel/user_namespace.c en Linux kernel anterior a 3.10.6 permite a usuarios locales provocar una denegación de servicio (consumo de memoria) a través de una llamada de liberación invalida CLONE_NEWUSER. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6160968cee8b90a5dd95318d716e31d7775c4ef3 http://twitter.com/grsecurity/statuses/364566062336978944 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6 http://www.openwall.com/lists/oss-security/2013/08/06/2 http://www.ubuntu.com/usn/USN-1971-1 http://www.ubuntu.com/usn/USN-1974-1 https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3 • CWE-399: Resource Management Errors •