Page 983 of 5206 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 114EXPL: 0

wan/sdla.c in Linux kernel 2.6.x before 2.6.11 and 2.4.x before 2.4.29 does not require the CAP_SYS_RAWIO privilege for an SDLA firmware upgrade, with unknown impact and local attack vectors. NOTE: further investigation suggests that this issue requires root privileges to exploit, since it is protected by CAP_NET_ADMIN; thus it might not be a vulnerability, although capabilities provide finer distinctions between privilege levels. • http://linux.bkbits.net:8080/linux-2.4/cset%401.1448.91.23?nav=index.html%7Csrc/%7Csrc/drivers%7Csrc/drivers/net%7Csrc/drivers/net/wan%7Crelated/drivers/net/wan/sdla.c http://secunia.com/advisories/18527 http://secunia.com/advisories/18977 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.kernel.org/git/?p=linux/kernel/git/tglx/history.git%3Ba=commitdiff%3Bh=0f1d4813a4a65296e1131f320a60741732bc068f http://www.securityfocus.com/bid/16304 h •

CVSS: 4.6EPSS: 0%CPEs: 26EXPL: 0

Buffer overflow in the CA-driver (dst_ca.c) for TwinHan DST Frontend/Card in Linux kernel 2.6.12 and other versions before 2.6.15 allows local users to cause a denial of service (crash) and possibly execute arbitrary code by "reading more than 8 bytes into an 8 byte long array". • http://secunia.com/advisories/18216 http://secunia.com/advisories/18527 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://www.mandriva.com/security/advisories?name=MDKSA-2006:040 http://www.securityfocus.com/bid/16142 http://www.vupen.com/english/advisories/2006/0035 https://exchange.xforce.ibmcloud.com/vulnerabilities/43323 https://usn.ubuntu.com/244-1 •

CVSS: 4.9EPSS: 0%CPEs: 60EXPL: 0

The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.securityfocus.com/bid/18173 •

CVSS: 3.6EPSS: 0%CPEs: 72EXPL: 0

Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://secunia.com/advisories/18216 http://secunia.com/advisories/18527 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/security/2006/dsa-1018 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2& •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors. • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169130 http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://rhn.redhat.com/errata/RHSA-2006-0101.html http://secunia.com/advisories/18510 http://secunia.com/advisories/18527 http://secunia.com/advisories/18788 http://secunia.com/advisories/19038 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2 •