Page 979 of 5206 results (0.040 seconds)

CVSS: 4.9EPSS: 11%CPEs: 43EXPL: 0

The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read. • http://lwn.net/Alerts/180820 http://secunia.com/advisories/19495 http://secunia.com/advisories/19735 http://secunia.com/advisories/19955 http://secunia.com/advisories/20398 http://secunia.com/advisories/20716 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba http •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

The default configuration of syslogd in the Linux sysklogd package does not enable the -x (disable name lookups) option, which allows remote attackers to cause a denial of service (traffic amplification) via messages with spoofed source IP addresses. • http://www.securityfocus.com/archive/1/429618/100/0/threaded http://www.securityfocus.com/archive/1/429739/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/25672 •

CVSS: 1.2EPSS: 0%CPEs: 74EXPL: 0

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call. El kernel de Linux 2.6.16-rc2 y versiones anteriores cuando se ejecutan sistemas x86_64 con prioridad activada, permite a usuarios locales provocar una denegación de servicio (oops) a través de múltiples tareas ptrace que realizan pasos individuales, lo que pueden provocar la corrupción de la pila DEBUG_STACK durante la llamada a la función do_debug. • http://marc.info/?l=linux-kernel&m=113932292516359&w=2 http://secunia.com/advisories/19374 http://secunia.com/advisories/19955 http://secunia.com/advisories/21614 http://www.debian.org/security/2006/dsa-1017 http://www.mandriva.com/security/advisories?name=MDKSA-2006:151 http://www.osvdb.org/24098 http://www.securityfocus.com/bid/17216 https://usn.ubuntu.com/281-1 •

CVSS: 10.0EPSS: 6%CPEs: 1EXPL: 0

Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure. • http://secunia.com/advisories/19330 http://secunia.com/advisories/19955 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/21045 http://www.debian.org/security/2006/dsa-1097 http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8763716bfe4d8a16bef28c9947cf9d799b1796a5 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16 http://www.mandri • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.9EPSS: 0%CPEs: 79EXPL: 0

Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function. • http://secunia.com/advisories/19330 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21465 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006/dsa-1097 http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee4bb818ae35f68d1f848eae0a • CWE-189: Numeric Errors •