Page 770 of 5141 results (0.017 seconds)

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The pmd_none_or_trans_huge_or_clear_bad function in include/asm-generic/pgtable.h in the Linux kernel before 3.13 on NUMA systems does not properly determine whether a Page Middle Directory (PMD) entry is a transparent huge-table entry, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted MADV_WILLNEED madvise system call that leverages the absence of a page-table lock. La función pmd_none_or_trans_huge_or_clear_bad en include/asm-generic/pgtable.h en el Kernel de Linux anterior a 3.13 en sistemas NUMA no determina adecuadamente si una entrada de direcotrio Page Middle Directory (PMD) es una entrada transparente de huge-table, lo que permite a usuarios locales causar una denegación de servicio (referencia a puntero nulo y caída del sistema) o la posibilidad de tener otro impacto no especificado a través de una llamada al sistema MADV_WILLNEED que se aprovecha de la ausencia del bloqueo de la tabla de páginas. A NULL pointer dereference flaw was found in the way the Linux kernel's madvise MADV_WILLNEED functionality handled page table locking. A local, unprivileged user could use this flaw to crash the system. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee53664bda169f519ce3c6a22d378f0b946c8178 http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00009.html http://rhn.redhat.com/errata/RHSA-2015-0290.html http://rhn.redhat.com/errata/RHSA-2015-0694.html https://bugzilla.redhat.com/show_bug.cgi?id=1198457 https://github.com/torvalds/linux/commit/ee53664bda169f519ce3c6a22d378f0b946c8178 https://access.redhat.com/security/cve/CVE-2014-8173 • CWE-476: NULL Pointer Dereference •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

The filesystem implementation in the Linux kernel before 3.13 performs certain operations on lists of files with an inappropriate locking approach, which allows local users to cause a denial of service (soft lockup or system crash) via unspecified use of Asynchronous I/O (AIO) operations. La implementación del sistema de fichero en el Kernel de Linux anterior a 3.13 realizar ciertas operaciones en listas de archivos con un inapropiado bloqueo, lo que permite a usuarios locales causar una denegación de servicio (bloqueo blando 'soft lockup' o caída del sistema) a través del uso de operaciones Asynchronous I/O (AIO) no especificadas. It was found that due to excessive files_lock locking, a soft lockup could be triggered in the Linux kernel when performing asynchronous I/O operations. A local, unprivileged user could use this flaw to crash the system. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=eee5cc2702929fd41cce28058dc6d6717f723f87 http://rhn.redhat.com/errata/RHSA-2015-0290.html http://rhn.redhat.com/errata/RHSA-2015-0694.html http://www.openwall.com/lists/oss-security/2015/03/09/3 https://bugzilla.redhat.com/show_bug.cgi?id=1198503 https://github.com/torvalds/linux/commit/eee5cc2702929fd41cce28058dc6d6717f723f87 https://access.redhat.com/security/cve/CVE-2014-8172 • CWE-17: DEPRECATED: Code •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The XFS implementation in the Linux kernel before 3.15 improperly uses an old size value during remote attribute replacement, which allows local users to cause a denial of service (transaction overrun and data corruption) or possibly gain privileges by leveraging XFS filesystem access. La implementación XFS en el Kernel de Linux anterior a 3.15 utiliza inadecuadamente un valor de tamaño antiguo durante el reemplazo del atributo remoto, lo que permite a usuarios locales causar una denegación de servicio (transacción de saturación y corrupción de datos) o la posibilidad de obtener privilegios aprovechando el acceso al sistema de archivos XFS. A flaw was found in the way the Linux kernel's XFS file system handled replacing of remote attributes under certain conditions. A local user with access to XFS file system mount could potentially use this flaw to escalate their privileges on the system. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59 http://rhn.redhat.com/errata/RHSA-2015-0290.html http://rhn.redhat.com/errata/RHSA-2015-0694.html http://www.securitytracker.com/id/1031853 http://www.ubuntu.com/usn/USN-2543-1 http://www.ubuntu.com/usn/USN-2544-1 https://bugzilla.redhat.com/show_bug.cgi?id=1195248 https://github.com/torvalds/linux/commit/8275cdd0e7ac550dcce2b3ef6d2fb3b808c1ae59 https://access.re • CWE-19: Data Processing Errors •

CVSS: 1.9EPSS: 0%CPEs: 2EXPL: 0

Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execution of this function. Condición de carrera en la función handle_to_path en fs/fhandle.c en el Kernel de Linux a través de 3.19.1 permite a usuarios locales evadir las restricciones del tamaño y lanzar operaciones de lectura en ubicaciones de memoria adicionales cambiando el valor de handle_bytes del manejador del archivo durante la ejecución de su función. • http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00021.html http://marc.info/?l=linux-kernel&m=142247707318982&w=2 http://www.debian.org/security/2015/dsa-3170 http://www.openwall • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 10.0EPSS: 5%CPEs: 12EXPL: 0

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data. Vulnerabilidad de uso después de liberación en la función sctp_assoc_update en net/sctp/associola.c en el Kernel de Linux anterior a 3.18.8 permite a atacantes remotos causar una denegación de servicio (corrupción de bloque y pánico) o la posibilidad de tener otro impacto no especificado mediante la provocación de una colisión INIT que lleva al manejo inadecuado de datos de shared-key. A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=600ddd6825543962fb807884169e57b580dba208 http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.html http://rhn.redhat.com/errata/RHSA-2015-0726.html http://rhn.redhat.com/errata/RHSA-2015-0751.html http://rhn.redhat.com/errata/RHSA-2015-0782.html http://rhn.redhat.com/errata/RHSA-2015-0864.html http://rhn.redhat. • CWE-416: Use After Free •