Page 958 of 5173 results (0.025 seconds)

CVSS: 9.4EPSS: 5%CPEs: 1EXPL: 0

The dev_queue_xmit function in Linux kernel 2.6 can fail before calling the local_bh_disable function, which could lead to data corruption and "node lockups." NOTE: it is not clear whether this issue is exploitable. La función dev_queue_xmit en el Kernel de Linux 2.6 puede fallar antes de la llamada a la función local_bh_disable, lo cual podría conducir a una corrupción de datos y "carceles de nodo". NOTA: no está claro si este asunto es explotable. • http://linux.bkbits.net:8080/linux-2.6/gnupatch%404186e5bfgUOMBbA6xFaY0_z84kaURw http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/23997 http://secunia.com/advisories/24206 http://secunia.com/advisories/25683 http://secunia.com/advisories/25714 http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm http://www.debian.org/security/2007/dsa-1304 http://www.novell.com/linux/security/advisories/2007_35_kernel.html http://www.securityfocus.com/bid/ •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation. La función aio_setup_ring en el kernel de Linux no inicializa adecuadamente una variable, lo cual permite a usuarios locales provocar denegación de servicio (caida) a través de rutas no especificadas erroneas que provocan una operación libre incorrecta. • http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/23997 http://secunia.com/advisories/24206 http://secunia.com/advisories/25683 http://secunia.com/advisories/25714 http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm http://www.debian.org/security/2007/dsa-1304 http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 http://www.novell.com/linux/security/advisories/2007_35_kernel.html http://www.securityfocus.com/bid/22193 https: •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

Unspecified versions of the Linux kernel allow local users to cause a denial of service (unrecoverable zombie process) via a program with certain instructions that prevent init from properly reaping a child whose parent has died. Versiones no especificadas del kernel de Linux, permiten a usuarios locales causar una denegación de servicio (proceso zombi irrecuperable) por medio de un programa con ciertas instrucciones que previene a init de recoger apropiadamente un proceso hijo cuyo proceso padre ha terminado. • http://secunia.com/advisories/27436 http://secunia.com/advisories/27747 http://secunia.com/advisories/29236 http://support.avaya.com/elmodocs2/security/ASA-2007-474.htm http://uwsg.iu.edu/hypermail/linux/kernel/0612.2/0980.html http://uwsg.iu.edu/hypermail/linux/kernel/0612.2/1021.html http://www.redhat.com/support/errata/RHSA-2007-0939.html http://www.redhat.com/support/errata/RHSA-2008-0154.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task. El núcleo de Linux anterior a 2.6.18, cuando se ejecuta en sistemas x86_64, no guarda o restaura adecuadamente las EFLAGS durante un cambio de contexto, lo cual permite a usuarios locales provocar una denegación de servicio (caída) provocando que SYSENTER active una bandera NT, lo que dispara una caída en el IRET de la siguiente tarea. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 http://secunia.com/advisories/24098 http://secunia.com/advisories/25691 http://secunia.com/advisories/26620 http://secunia.com/advisories/26994 http://secunia.com/advisories/32485 http://www.debian.org/security/2007/dsa-1381 http://www.kernel.org&# •

CVSS: 1.7EPSS: 0%CPEs: 1EXPL: 0

The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. La función isdn_ppp_ccp_reset_alloc_state en el drivers/isdn/isdn_ppp.c del kernel del Linu 2.4 anterior al 2.4.34-rc4 no llama a la función init_timer para restaurar el estado del temporizador ISDN PPP CCP, lo cual genera vectores de ataque desconocidos y, como resultado, la caída del sistema. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34 http://secunia.com/advisories/23529 http://secunia.com/advisories/23609 http://secunia.com/advisories/23752 http://secunia.com/advisories/24098 http://secunia.com/advisories/24100 http://secunia.com/advisories/24547 http://secunia.com/advisories/25226 http://secunia.com/advisories/25683 http://secunia.com/advisories/25691 http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff% •