Page 968 of 5187 results (0.019 seconds)

CVSS: 5.4EPSS: 1%CPEs: 1EXPL: 0

Race condition between the kfree_skb and __skb_unlink functions in the socket buffer handling in Linux kernel 2.6.9, and possibly other versions, allows remote attackers to cause a denial of service (crash), as demonstrated using the TCP stress tests from the LTP test suite. Condición de carrera entre las funciones kfree_skb y __skb_unlink en el manejo de búfer de socket del núcleo de Linux 2.6.9, y posiblemente otras versiones, permite a atacantes ermotos provocar una denegación de servicio (caída), como se ha demostrado usando las pruebas de estrés TCP del conjunto de pruebas LTP. • http://secunia.com/advisories/21465 http://secunia.com/advisories/22082 http://secunia.com/advisories/22093 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006/dsa-1183 http://www.debian.org/security/2006/dsa-1184 http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 http://www.redhat.com/support/errata/RHSA-2006-0575.html http://www.securityfocus.com/bid/19475 https://bugzilla •

CVSS: 4.9EPSS: 0%CPEs: 5EXPL: 0

The (1) __futex_atomic_op and (2) futex_atomic_cmpxchg_inatomic functions in Linux kernel 2.6.17-rc4 to 2.6.18-rc2 perform the atomic futex operation in the kernel address space instead of the user address space, which allows local users to cause a denial of service (crash). Las funciones (1) __futex_atomic_op y (2) futex_atomic_cmpxchg_inatomic en Linux kernel 2.6.17-rc4 hasta 2.6.18-rc2 reakuza ka ioeracuñib atómica futex con direcciones del espacio del usuario en vez de direcciones del espacio del núcleo, que permite que los usuarios locales provoquen una denegación de servicio (caida). • http://security-tracker.debian.org/tracker/CVE-2006-3634 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bafe00cc9297ca77b66e5c83e5e65e17c0c997c8 •

CVSS: 7.8EPSS: 43%CPEs: 191EXPL: 1

Linux kernel 2.6.x, when using both NFS and EXT3, allows remote attackers to cause a denial of service (file system panic) via a crafted UDP packet with a V2 lookup procedure that specifies a bad file handle (inode number), which triggers an error and causes an exported directory to be remounted read-only. Linux kernel 2.6.x, cuando utiliza NFS y EXT3, permite a atacantes remotos provocar denegación de servicio (panic en el sistema de archivos) a través de paquetes UDP manipulados con un procedimiento de búsqueda V2 que especifica una cabecera de fichero mala (número de inode), lo cual dispara un error y provocar un directorio exportado se remontado en solo lectura. • https://www.exploit-db.com/exploits/28358 http://lkml.org/lkml/2006/7/17/41 http://secunia.com/advisories/21369 http://secunia.com/advisories/21605 http://secunia.com/advisories/21614 http://secunia.com/advisories/21847 http://secunia.com/advisories/21934 http://secunia.com/advisories/22093 http://secunia.com/advisories/22148 http://secunia.com/advisories/22174 http://secunia.com/advisories/22822 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http:&# •

CVSS: 6.2EPSS: 0%CPEs: 42EXPL: 0

Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root. Condición de carrera en Linux kernel 2.6.17.4 y anteriores permite a usuarios locales ganar privilegios de root a través del uso de prctl con PR_SET_DUMPABLE en un camino que hace que /proc/self/environ llegue a tener el setuid de root. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.5 http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html http://secunia.com/advisories/21041 http://secunia.com/advisories/21057 http://secunia.com/advisories/21073 http://secunia.com/advisories/21119 http://secunia.com/advisories/21123 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21605 http://secunia.com/advisories/22174 http://suppor •

CVSS: 7.8EPSS: 1%CPEs: 162EXPL: 0

The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued. El controlador ftdi_sio (usb/serial/ftdi_sio.c) en el kernel de Linux de 2.6.x a 2.6.17 y posiblemente versiones posteriores, permite a usuarios locales provocar una denegación de servicio (consumo de memoria) al escribir mas datos al puerto serie de los que puede manejar el hardware, lo que provoca que los datos queden en cola. • http://secunia.com/advisories/20703 http://secunia.com/advisories/21057 http://secunia.com/advisories/21298 http://secunia.com/advisories/21605 http://secunia.com/advisories/21614 http://secunia.com/advisories/21934 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://secunia.com/advisories/24547 http://secunia.com/advisories/25226 http://secunia.com/advisories/25683 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http://www.debian • CWE-399: Resource Management Errors •