Page 985 of 5206 results (0.017 seconds)

CVSS: 4.9EPSS: 0%CPEs: 87EXPL: 1

The atm module in Linux kernel 2.6 before 2.6.14 allows local users to cause a denial of service (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules. • http://linux.bkbits.net:8080/linux-2.6/cset%404339c66aLroC1_zunYKhEIbtIWrnwg http://secunia.com/advisories/19220 http://secunia.com/advisories/20237 http://secunia.com/advisories/20914 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1103 http://www.mandriva.com/security/advisories?name=MDKSA-2006:059 http://www.redhat.com/support/errata/RHSA-2006-0493.html http://www.securityfocus.com/bid/ •

CVSS: 5.0EPSS: 9%CPEs: 70EXPL: 0

Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client. • http://secunia.com/advisories/20398 http://secunia.com/advisories/22082 http://secunia.com/advisories/22093 http://www.debian.org/security/2006/dsa-1183 http://www.debian.org/security/2006/dsa-1184 http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commitdiff%3Bh=87e03738fc15dc3ea4acde3a5dcb5f84b6b6152b http://www.novell.com/linux/security/adviso •

CVSS: 4.9EPSS: 0%CPEs: 59EXPL: 0

The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function. • http://marc.info/?l=linux-kernel&m=112323336017157 http://secunia.com/advisories/22292 http://secunia.com/advisories/22945 http://secunia.com/advisories/25714 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://www.debian.org/security/2007/dsa-1304 http://www.redhat.com/support/errata/RHSA-2006-0689.html http://www.securityfocus.com/bid/20362 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=165345 https://oval.cisecurity.org/repository/search/definition •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 1

The procfs code (proc_misc.c) in Linux 2.6.14.3 and other versions before 2.6.15 allows attackers to read sensitive kernel memory via unspecified vectors in which a signed value is added to an unsigned value. • https://www.exploit-db.com/exploits/9363 http://linux.bkbits.net:8080/linux-2.6/cset%4043b562ae6hJGLWZA4TNf2k-RzXnVlQ http://linux.bkbits.net:8080/linux-2.6/gnupatch%4043b562ae6hJGLWZA4TNf2k-RzXnVlQ http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://marc.info/?l=full-disclosure&m=113535380422339&w=2 http://secunia.com/advisories/18216 http://secunia.com/advisories/18351 http://secunia.com/advisories/18510 http://secunia.com/advisories/18527 http://secunia •

CVSS: 4.9EPSS: 0%CPEs: 215EXPL: 0

Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference. • http://secunia.com/advisories/18205 http://securityreason.com/securityalert/291 http://securitytracker.com/id?1015402 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=362 http://www.securityfocus.com/bid/16041 http://www.vupen.com/english/advisories/2005/3076 https://exchange.xforce.ibmcloud.com/vulnerabilities/23835 •