Page 926 of 5163 results (0.048 seconds)

CVSS: 4.9EPSS: 0%CPEs: 323EXPL: 0

Stack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via unspecified vectors that trigger page faults on a machine that has a registered Kprobes probe. Vulnerabilidad de agotamiento de pila en la función do_page_fault en arch/x86/mm/fault.c en el kernel de Linux anterior a v2.6.28.5 permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) o posiblemente obtener privilegios a través de vectores no especificados que lanza fallos de página en la máquina que ha registrado una prueba Kprobes. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=9be260a646bf76fa418ee519afa10196b3164681 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.5 http://www.securityfocus.com/bid/33758 http://www.ubuntu.com/usn/usn-751-1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.9EPSS: 0%CPEs: 238EXPL: 0

The (1) sys32_mremap function in arch/sparc64/kernel/sys_sparc32.c, the (2) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c, and the (3) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux kernel before 2.6.25.4, omit some virtual-address range (aka span) checks when the mremap MREMAP_FIXED bit is not set, which allows local users to cause a denial of service (panic) via unspecified mremap calls, a related issue to CVE-2008-2137. Las funciones (1) sys32_mremap en arch/sparc64/kernel/sys_sparc32.c, (2) sparc_mmap_check en arch/sparc/kernel/sys_sparc.c, y (3) sparc64_mmap_check en arch/sparc64/kernel/sys_sparc.c, en el kernel de Linux anteriores a v2.6.25.4, omite algunas comprobaciones de rangos de direcciones virtuales (también conocido como span) cuando el bit mremap MREMAP_FIXED no esta fijado, lo que permite a usuarios locales producir una denegación de servicio (panic) a través de llamadas inespecíficas mremap, relacionado con CVE-2008-2137. • http://marc.info/?l=linux-kernel&m=121071103304610&w=2 http://secunia.com/advisories/30258 http://securitytracker.com/id?1020120 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.4 http://www.securityfocus.com/bid/33836 http://www.ubuntu.com/usn/usn-751-1 http://www.vupen.com/english/advisories/2008/1655/references https://exchange.xforce.ibmcloud.com/vulnerabilities/48710 • CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 7EXPL: 0

drivers/firmware/dell_rbu.c in the Linux kernel before 2.6.27.13, and 2.6.28.x before 2.6.28.2, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size file in /sys/devices/platform/dell_rbu/. drivers/firmware/dell_rbu.c en el Kernel Linux anterior a v2.6.27.13 y v2.6.28.x anterior a v2.6.28.2, permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) a través de una llamada al sistema de lectura que especifica cero bytes desde el archivo (1) image_type o (2) packet_size en /sys/devices/platform/dell_rbu/. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=81156928f8fe31621e467490b9d441c0285998c3 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.13 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.28.2 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html http://secunia. • CWE-189: Numeric Errors CWE-399: Resource Management Errors •

CVSS: 4.9EPSS: 0%CPEs: 9EXPL: 0

fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 2.6.28.1 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, leading to use of a -1 return value as an array index. El codigo fuente del fichero fs/ecryptfs/inode.c en el subsistema eCryptfs de versiones del kernel de Linux anteriores a la 2.6.28.1 permite a usuarios locales provocar una denegación de servicio (con fallo o corrupción de memoria), o posiblemente tener algún otro impacto no especificado, a través de una llamada a readlink que resulta en un error que provoca un valor de retorno -1 en el indice de un array. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.27.y.git%3Ba=commit%3Bh=a17d5232de7b53d34229de79ec22f4bb04adb7e4 http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00000.html http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00001.html http://secunia.com/advisories/33758 http://secunia.com/advisories/34394 http://secunia.com/advisories/34502 http://secunia.com/advisories/34981 http: • CWE-787: Out-of-bounds Write •

CVSS: 4.9EPSS: 0%CPEs: 111EXPL: 0

Memory leak in the keyctl_join_session_keyring function (security/keys/keyctl.c) in Linux kernel 2.6.29-rc2 and earlier allows local users to cause a denial of service (kernel memory consumption) via unknown vectors related to a "missing kfree." Fuga de memoria en la función keyctl_join_session_keyring (security/keys/keyctl.c) en el kernel de Linux 2.6.29-rc2 y anteriores permite a usuarios locales provocar una denegación de servicio(agotamiento de memoria del núcleo) a través de vectores desconocidos relacionados con "kfree perdido." • http://git2.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d54ee1c7850a954026deec4cd4885f331da35cc http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00003.html http://osvdb.org/51501 http://rhn.redhat.com/errata/RHSA-2009-0264.html http://secunia.com/advisories/33858 http://secunia.com/advisories/34252 http://secunia.com/advisories/34394 http://secunia.com/advisories/34502 http://secunia.com/advisories/34762 http://secunia.com/advisories/34981 http • CWE-399: Resource Management Errors •