Page 809 of 4805 results (0.024 seconds)

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 2

The udp_queue_rcv_skb function in net/ipv4/udp.c in a certain Red Hat build of the Linux kernel 2.6.18 in Red Hat Enterprise Linux (RHEL) 5 allows attackers to cause a denial of service (deadlock and system hang) by sending UDP traffic to a socket that has a crafted socket filter, a related issue to CVE-2010-4158. La función udp_queue_rcv_skb en net/ipv4/udp.c en determinados Red Hat del kernel de Linux v2.6.18 en Red Hat Enterprise Linux (RHEL) v5 permite a atacantes provocar una denegación de servicio (abrazo mortal y bloqueo del sistema) mediante el envío de tráfico UDP que tiene un filtro manipulado, relacionado con CVE-2.010-4.158. • http://secunia.com/advisories/42789 http://secunia.com/advisories/46397 http://www.redhat.com/support/errata/RHSA-2011-0004.html http://www.securityfocus.com/archive/1/514845 http://www.securityfocus.com/archive/1/520102/100/0/threaded http://www.spinics.net/lists/netdev/msg146404.html http://www.vmware.com/security/advisories/VMSA-2011-0012.html http://www.vupen.com/english/advisories/2011/0024 https://bugzilla.redhat.com/show_bug.cgi?id=651698 https://bugzilla.redhat. • CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 11EXPL: 3

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter. La función sk_run_filter en net/core/filter.c en el kernel de Linux anteriores a v2.6.36.2 no comprueba si una posición de memoria determinada se ha inicializado antes de ejecutar una instrucción (1) BPF_S_LD_MEM o (2) BPF_S_LDX_MEM, permite a usuarios locales obtener información potencialmente confidencial de pila del núcleo de la memoria a través de un filtro socket manipulado. • https://www.exploit-db.com/exploits/34987 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=57fe93b374a6b8711995c2d466c502af9f3a08bb http://lists.fedoraproject.org/pipermail/package-announce/2010-December/052513.html http://lists.grok.org.uk/pipermail/full-disclosure/2010-November/077321.html http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html http://lists.opensuse.org/opensuse- • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 7.1EPSS: 0%CPEs: 8EXPL: 4

The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP. La función aun_incoming en net/econet/af_econet.c en el kernel de Linux anterior a v2.6.37-rc6, cuando Econet está activado, permite a atacantes remotos provocar una denegación de servicio (desreferencia a un puntero NULL y OOPS) mediante el envío de un paquete Acorn Universal Networking (AUN)sobre UDP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e085e76cbe558b79b54cbab772f61185879bc64 http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html http://marc.info/?l=linux-netdev&m=129185496013580&w=2 http://marc.info/?l=linux-netdev&m=129186011218615&w=2 http://openwall.com/lists/oss-security/2010/12/09/1 http://openwall.com/lists/oss-security/2010/12/09/2 http://secunia.com/advisories/43291 http://www.kernel.org/pub • CWE-476: NULL Pointer Dereference •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename. La función bcm_connect en net/can/bcm.c (también conocido como el Broadcast Manager) en la implementación del Controller Area Network en el kernel de Linux 2.6.36 y anteriores crea un archivo público accesible con un nombre que contiene una dirección de memoria del kernel, lo que permite a usuarios locales obtener información sensible sobre el uso de memoria del kernel listado por este nombre de archivo. • http://openwall.com/lists/oss-security/2010/11/03/3 http://openwall.com/lists/oss-security/2010/11/04/4 http://openwall.com/lists/oss-security/2010/12/20/2 http://openwall.com/lists/oss-security/2010/12/21/1 http://www.mandriva.com/security/advisories?name=MDVSA-2011:029 http://www.securityfocus.com/bid/44661 http://www.spinics.net/lists/netdev/msg145791.html http://www.spinics.net/lists/netdev/msg145796.html http://www.spinics.net/lists/netdev/msg146270 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.5EPSS: 0%CPEs: 3EXPL: 0

drivers/scsi/bfa/bfa_core.c in the Linux kernel before 2.6.35 does not initialize a certain port data structure, which allows local users to cause a denial of service (system crash) via read operations on an fc_host statistics file. drivers/scsi/AMB/bfa_core.c en el kernel de Linux anterior a v2.6.35 no inicializa una estructura de datos en un determinado puerto, lo que permite a usuarios locales causar una denegación de servicio (caída del sistema) a través de las operaciones de lectura en un fichero de estadísticas fc_host. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7873ca4e4401f0ecd8868bf1543113467e6bae61 http://secunia.com/advisories/42884 http://secunia.com/advisories/46397 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.35 http://www.openwall.com/lists/oss-security/2010/12/08/3 http://www.openwall.com/lists/oss-security/2010/12/09/15 http://www.redhat.com/support/errata/RHSA-2011-0017.html http://www.securityfocus.com/archive/1/520102&#x • CWE-665: Improper Initialization •