Page 970 of 5188 results (0.027 seconds)

CVSS: 5.6EPSS: 1%CPEs: 138EXPL: 0

Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c). kernel de Linux anterior a v2.6.16.21 y v2.6.17, cuando se ejecuta en PowerPC, no realiza correctamente ciertas comprobaciones requeridas access_ok, que permite a usuarios locales leer memoria del kernel de su elección en sistemas 64-bit (signal_64.c) y provoca una denegación de servicio (caída) y posibilita leer memorial del kernet en sistemas 32-bit (signal_32.c). • http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21179 http://secunia.com/advisories/21465 http://secunia.com/advisories/21498 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c85d1f9d358b24c5b05c3a2783a78423775a080 http://www.kernel.org/pub/linux/kernel/v2.6 •

CVSS: 7.8EPSS: 5%CPEs: 148EXPL: 0

xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length. xt_sctp en netfilter para el kernel Linux anterior a v2.6.17.1 permite a atacantes provocar una denegación de servivio (bucle infinito) a través de un fragmento SCTP con longitud 0 (cero). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.1 http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://securitytracker.com/id?1016347 http://www.mandriva.com/security/advisories?name=MDKSA-2006:123 http://www.novell.com/linux/security/advisories/2006_42_kernel.html http://www.novell.com/linux/security/advisories/2006_47_kernel.html&# •

CVSS: 4.0EPSS: 1%CPEs: 139EXPL: 0

Race condition in run_posix_cpu_timers in Linux kernel before 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting. Condición de carrera en run_posix_cpu_timers en el kernel Linux anterior a v2.6.16.21 permite a usuarios locales provocar una denegación de servicio (caída BUG_ON) provocando que una CPU asocie un temporizador a un proceso que está saliendo. • http://marc.info/?l=linux-kernel&m=115015841413687 http://secunia.com/advisories/20703 http://secunia.com/advisories/20831 http://secunia.com/advisories/20991 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=30f1e3dd8c72abda343bcf415f7d8894a02b4290 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.21 http://www.mandriva.com/security/advisories?name=MDKSA-2006:12 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges. artswrapper en aRts, cuando se ejecuta como root sobre linux 2.6.0 o versiones posteriores, no valida la variable setuid de retorno de la llamada a la función, lo que permite a usuarios locales ganar privilegios de root al provocar un fallo sobre setuid. • http://dot.kde.org/1150310128 http://mail.gnome.org/archives/beast/2006-December/msg00025.html http://secunia.com/advisories/20677 http://secunia.com/advisories/20786 http://secunia.com/advisories/20827 http://secunia.com/advisories/20868 http://secunia.com/advisories/20899 http://secunia.com/advisories/25032 http://secunia.com/advisories/25059 http://security.gentoo.org/glsa/glsa-200704-22.xml http://securitytracker.com/id?1016298 http://slackware.com/security/viewer.php? • CWE-273: Improper Check for Dropped Privileges •

CVSS: 4.0EPSS: 0%CPEs: 38EXPL: 1

Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h. Condición de carrera en el kernel de Linux 2.6.15 hasta la versión 2.6.17, cuando se está ejecutado en plataformas SMP, permite a usuarios locales provocar una denegación de servicio (caída) creando y finalizando un gran número de tareas, posteriormente accediendo a entrada /proc de una tarea que está finalizando, lo que provoca corrupción de memoria que conduce a un fallo en la función prune_dcache o un error BUG_ON en include/linux/list.h. • https://www.exploit-db.com/exploits/27925 http://marc.info/?l=linux-kernel&m=114860432801543&w=2 http://secunia.com/advisories/20349 http://www.osvdb.org/25847 http://www.securityfocus.com/bid/18183 http://www.vupen.com/english/advisories/2006/2070 https://exchange.xforce.ibmcloud.com/vulnerabilities/26746 •