Page 808 of 5145 results (0.025 seconds)

CVSS: 4.7EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. El driver en el subsistema del Interfaz de Dispositivo Humano (HID) en el núcleo de Linux hasta 3.11 cuando es habilitada CONFIG_HID_LENOVO_TPKBD permite a atacantes físicos causar denegación de servicio (escritura fuera de rango en memoria dinámica) a través de un servicio manipulado • http://marc.info/?l=linux-input&m=137772187514628&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://www.ubuntu.com/usn/USN-2020-1 http://www.ubuntu.com/usn/USN-2023-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

Multiple array index errors in drivers/hid/hid-core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11 allow physically proximate attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted device that provides an invalid Report ID. Multiples indices de array en drivers/hid/hid-core.c del subsistema Dispositivo de Interfaz Humano (HID) en el núcleo de Linux hasta 3.11, permite a atacantes físicos ejecutar código arbitrario o causar denegación de servicio (corrupción de memoria dinámica) a través de un dispositivo manipulado que proporcione un Report ID inválido • http://marc.info/?l=linux-input&m=137772180514608&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://rhn.redhat.com/errata/RHSA-2013-1645.html http://www.debian.org/security/2013/dsa-2766 http://www.ubuntu.com/usn/USN-1976-1 http://www.ubuntu.com/usn/USN-1977-1 http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 http://www.ubuntu.com/usn/USN-2019- • CWE-20: Improper Input Validation •

CVSS: 4.7EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device. drivers/hid/hid-ntrig.c en el subsistema Human Interface Device (HID) del kernel Linux hasta 3.11, cuando CONFIG_HID_NTRIG es activado, permite a atacantes con acceso físico causar una denegación de servicio (referencia a puntero nulo y OOPS) a través de un dispositivo manipulado. • http://marc.info/?l=linux-input&m=137772189314633&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 http://www.ubuntu.com/usn/USN-2019-1 http://www.ubuntu.com/usn/USN-2021-1 http://www.ubuntu.com/usn/USN-2022-1 http://www.ubuntu.com/usn/USN-2024-1 http://www.ubuntu.com/usn/USN-2038-1 http:/&#x • CWE-476: NULL Pointer Dereference •

CVSS: 4.7EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-picolcd_core.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PICOLCD is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device. drivers/hid/hid-picolcd_core.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta la versión 3.11, cuando CONFIG_HID_PICOLCD está habilitado, permite físicamente a atacantes próximos causar una denegación de servicio (Referencia a puntero nulo y OOPS) a través de un dispositivo manipulado. • http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html http://marc.info/?l=linux-input&m=137772191714649&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://www.ubuntu.com/usn/USN-1995-1 http://www.ubuntu.com/usn/USN-1998-1 http://www.ubuntu.com/usn/USN-2019-1 http://www.ubuntu.com/usn/USN-2021-1 http://www.ubuntu.com/usn/USN-2022-1 http: • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.2EPSS: 0%CPEs: 259EXPL: 0

drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-logitech-dj.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta v3.11, cuando CONFIG_HID_LOGITECH_DJ está activo, permite atacantes físicamente próximos causar denegación de servicio (referencia a puntero a NULL y OOPS) u obtener información sensible desde memoria del kernel a través de un dispositivo manipulado. • http://marc.info/?l=linux-input&m=137772188314631&w=1 http://openwall.com/lists/oss-security/2013/08/28/13 http://rhn.redhat.com/errata/RHSA-2013-1490.html http://www.ubuntu.com/usn/USN-2019-1 http://www.ubuntu.com/usn/USN-2020-1 http://www.ubuntu.com/usn/USN-2021-1 http://www.ubuntu.com/usn/USN-2022-1 http://www.ubuntu.com/usn/USN-2023-1 http://www.ubuntu.com/usn/USN-2024-1 http://www.ubuntu.com/usn/USN-2038-1 http:/&#x • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •