Page 981 of 5206 results (0.034 seconds)

CVSS: 4.6EPSS: 0%CPEs: 99EXPL: 0

The die_if_kernel function in arch/ia64/kernel/unaligned.c in Linux kernel 2.6.x before 2.6.15.6, possibly when compiled with certain versions of gcc, has the "noreturn" attribute set, which allows local users to cause a denial of service by causing user faults on Itanium systems. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://secunia.com/advisories/19078 http://secunia.com/advisories/19220 http://secunia.com/advisories/19607 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/21136 http://secunia.com/advisories/21465 http://secunia.com/advisories/21983 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-200 •

CVSS: 2.1EPSS: 2%CPEs: 101EXPL: 0

The Linux Kernel before 2.6.15.5 allows local users to cause a denial of service (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (direct I/O). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 http://secunia.com/advisories/19083 http://secunia.com/advisories/19108 http://secunia.com/advisories/19220 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20914 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1103 http://www.mandriva.com/security/advisories?name=MDKSA •

CVSS: 1.2EPSS: 0%CPEs: 84EXPL: 0

Linux kernel before 2.6.15.5, when running on Intel processors, allows local users to cause a denial of service ("endless recursive fault") via unknown attack vectors related to a "bad elf entry address." • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 http://secunia.com/advisories/19083 http://secunia.com/advisories/19108 http://secunia.com/advisories/19220 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/21136 http://secunia.com/advisories/21745 http://secunia.com/advisories/21983 http://securitytracker.com/id?1015724 http://supp •

CVSS: 1.7EPSS: 0%CPEs: 101EXPL: 0

Linux kernel 2.6 before 2.6.15.5 allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.5 http://secunia.com/advisories/19083 http://secunia.com/advisories/19220 http://secunia.com/advisories/20398 http://secunia.com/advisories/20914 http://www.debian.org/security/2006/dsa-1103 http://www.mandriva.com/security/advisories?name=MDKSA-2006:059 http://www.mandriva.com/security/advisories?name=MDKSA-2006:150 http://www.novell.com/linux/security/advisories/2006-05-31.html http://www.securityfocus.com/bi •

CVSS: 5.0EPSS: 12%CPEs: 42EXPL: 0

Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value. El kernel de Linux en versiones anteriores a 2.6.15.3 hasta la versión 2.6.12, mientras construye una respuesta ICMP en icmp_send, no maneja adecuadamente cuando la función ip_options_echo en icmp.c falla, lo que permite a atacantes remotos provocar una denegación de servicio (caída) a través de vectores, tales como (1) record-route y (2) opciones timestamp IP opciones con el conjunto de bit needaddr y un valor truncado. • http://lists.immunitysec.com/pipermail/dailydave/2006-February/002909.html http://marc.info/?l=linux-kernel&m=113927617401569&w=2 http://marc.info/?l=linux-kernel&m=113927648820694&w=2 http://secunia.com/advisories/18766 http://secunia.com/advisories/18774 http://secunia.com/advisories/18784 http://secunia.com/advisories/18788 http://secunia.com/advisories/18861 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15.3 http://www.mandriva.com/security/advisories&# • CWE-399: Resource Management Errors •