Page 963 of 5187 results (0.033 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The ReiserFS functionality in Linux kernel 2.6.18, and possibly other versions, allows local users to cause a denial of service via a malformed ReiserFS file system that triggers memory corruption when a sync is performed. La funcionalidad ReiserFS en Linux kernel 2.6.18, y posiblemente otras versiones, permite a un usuario local provocar denegación de servicio a través de sistemas de archivos manipulados ReiserFS que dispara una corrupción de memoria cuando se lleva a cabo una sincronización. • http://projects.info-pull.com/mokb/MOKB-25-11-2006.html http://secunia.com/advisories/23093 http://www.vupen.com/english/advisories/2006/4716 https://exchange.xforce.ibmcloud.com/vulnerabilities/30551 •

CVSS: 4.9EPSS: 0%CPEs: 104EXPL: 1

The Linux kernel 2.6.x up to 2.6.18, and possibly other versions, on Fedora Core 6 and possibly other operating systems, allows local users to cause a denial of service (crash) via a malformed gfs2 file stream that triggers a NULL pointer dereference in the init_journal function. El kernel de Linux 2.6.x hasta to 2.6.18, y posiblemente otras versiones, en Fedora Core 6 y posiblemente otros sistemas operativos, permite a usuarios locales provocar una denegación de servicio (caída) mediante una secuencia de fichero gfs2 mal formado que dispara un referencia a puntero NULL en la función init_journal. • http://projects.info-pull.com/mokb/MOKB-15-11-2006.html http://secunia.com/advisories/22886 http://secunia.com/advisories/24098 http://www.ubuntu.com/usn/usn-416-1 http://www.vupen.com/english/advisories/2006/4556 https://exchange.xforce.ibmcloud.com/vulnerabilities/30307 •

CVSS: 4.0EPSS: 0%CPEs: 107EXPL: 1

The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum. El código del sistema de ficheros ext2 en Linux kernel 2.6 permite a usuarios locales provocar una denegación de servicio (caída) mediante una sequencia ext2 con estructuras de datos mal formadas que dispara un error en ext2_check_page debido a una longitud inferior al mínimo. • http://projects.info-pull.com/mokb/MOKB-12-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://rhn.redhat.com/errata/RHSA-2007-0436.html http://secunia.com/advisories/22837 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/25630 http://secunia.com/advisories/25691 http://secunia.com/advisories/26379 http://secunia.com/advisori •

CVSS: 4.9EPSS: 0%CPEs: 107EXPL: 1

The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures. La función ext3fs_dirhash en el kernel de Linux 2.6.x permite a usuarios locales provocar una denegación de servicio (caída) mediante un flujo (stream) ext3 con estructuras de datos mal formadas. • http://projects.info-pull.com/mokb/MOKB-10-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22776 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24100 http://secunia.com/advisories/24206 http://secunia.com/advisories/24482 http://secunia.com/advisories/25691 http://secunia.com/advisories/25714 http://secunia.com/advisories/29058 http:&# •

CVSS: 4.0EPSS: 0%CPEs: 182EXPL: 2

The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. El código del sistema de ficheros minix en el kernel de Linux 2.6.x anterior a 2.6.24 incluyendo 2.6.18, permite a usuarios locales provocar una denegación de servicio (cuelgue) mediante un secuencia de fichero minix que dispara un bucle infinito en la función minix_bmap. NOTA: Esta vulnerabilidad podría deberse a un desbordamiento de entero o error de presencia de signo en entero. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24 http://projects.info-pull.com/mokb/MOKB-17-11-2006.html http://secunia.com/advisories/23034 http://secunia.com/advisories/26379 http://secunia.com/advisories/27528 http://secunia.com/advisories/27614 http://secunia.com/advisories/27703 http://secunia.com/advisories/28141 http://secunia.com/advisories/28170 http://secunia.com/advisories/28654 http://secunia.com/advisories/28706 http://secunia.com/advisories • CWE-189: Numeric Errors •