Page 986 of 5206 results (0.014 seconds)

CVSS: 4.9EPSS: 0%CPEs: 98EXPL: 2

Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs. Linux kernel anteriores a 2.6.15, permite a usuarios locales causar una denegación de servicio (pánico) mediante una llamada set_mempolicy con una máscara de bits 0, lo que causa un pánico cuando ocurre un fallo de página. • https://www.exploit-db.com/exploits/27031 http://linux.bkbits.net:8080/linux-2.6/cset%4042307e9fp8ihEMrfaoPMp_agDevQNA http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://secunia.com/advisories/18216 http://secunia.com/advisories/18510 http://secunia.com/advisories/18788 http://secunia.com/advisories/19038 http://secunia.com/advisories/19374 http://securitytracker.com/id?1015433 http://www.debian.org/security/2006/dsa-1017 http://www.kernel.org/pub& •

CVSS: 7.8EPSS: 4%CPEs: 26EXPL: 0

Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://marc.info/?l=linux-kernel&m=112508479120081&w=2 http://marc.info/?l=linux-kernel&m=112533899509033&w=2 http://secunia.com/advisories/18203 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/ •

CVSS: 4.9EPSS: 0%CPEs: 104EXPL: 1

The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function. • https://www.exploit-db.com/exploits/26648 ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://marc.info/?l=linux-kernel&m=113175851920568&w=2 http://marc.info/?l=linux-kernel&m=113190437101622&w=2 http://secunia.com/advisories/17786 http://secunia.com/advisories/17787 http://secunia.com/advisories/18203 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19369 http://secunia.com/advisories/1937 • CWE-399: Resource Management Errors •

CVSS: 7.8EPSS: 2%CPEs: 32EXPL: 0

Memory leak in the icmp_push_reply function in Linux 2.6 before 2.6.12.6 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "DST leak in icmp_push_reply." • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://marc.info/?l=linux-kernel&m=112431016816937&w=2 http://marc.info/?l=linux-kernel&m=112439084918917&w=2 http://marc.info/?l=linux-kernel&m=112508479212728&w=2 http://secunia.com/advisories/18203 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www. •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump. • http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://marc.info/?l=linux-kernel&m=112430346613450&w=2 http://marc.info/?l=linux-kernel&m=112508422716574&w=2 http://secunia.com/advisories/19038 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.kernel.org/git/?p=linux/kernel/git/chrisw/stable-queue.git%3Ba=blob%3Bh=f6cc7e101c49f356e4c4df5cca1ff352a0f01dd5%3Bhb=9c5fcb99af7c157be45e9d53aeb857ded5211fcd%3Bf=2.6.12.6/nptl-signal-d • CWE-667: Improper Locking •