Page 990 of 5206 results (0.029 seconds)

CVSS: 5.0EPSS: 1%CPEs: 133EXPL: 0

The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats. • http://linux.bkbits.net:8080/linux-2.4/cset%4041e2cf515TpixcVQ8q8HvQvCv9E6zA http://linux.bkbits.net:8080/linux-2.6/cset%40423114bcdthRtmtdS6MsZiBVvteGCg http://lkml.org/lkml/2005/5/23/169 http://secunia.com/advisories/17826 http://secunia.com/advisories/18056 http://secunia.com/advisories/21035 http://securitytracker.com/id?1014115 http://www.debian.org/security/2005/dsa-922 http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 http://www.mandriva.com/security/advisories?na • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.6EPSS: 4%CPEs: 117EXPL: 0

The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://linux.bkbits.net:8080/linux-2.6/cset%4042e14e05d0V1d88nZlaIX1F9dCRApA http://secunia.com/advisories/17826 http://secunia.com/advisories/17918 http://secunia.com/advisories/18056 http://secunia.com/advisories/18059 http://secunia.com/advisories/18562 http://secunia.com/advisories/18684 http://secunia.com/advisories/18977 http://secunia.com/advisories/19185 http://secunia.com/advisories/19607 http://www.de •

CVSS: 5.0EPSS: 1%CPEs: 25EXPL: 0

Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets. • http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A http://secunia.com/advisories/18056 http://secunia.com/advisories/20237 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2005/dsa-922 http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 http://www.redhat.com/support/errata/RHSA-2006-0493.html http://www.securityfocus.com/bid/15536 https://oval.cisecurity.org/reposito •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Exec in Linux kernel 2.6 does not properly clear posix-timers in multi-threaded environments, which results in a resource leak and could allow a large number of multiple local users to cause a denial of service by using more posix-timers than specified by the quota for a single user. • http://linux.bkbits.net:8080/linux-2.6/cset%40414b332fsZQvEUsfzKJIo-q2_ZH0hg http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/18056 http://www.debian.org/security/2005/dsa-922 http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.securityfocus.com/advisories/9806 http://www.securityfocus.com/bid/15533 http://www.ussg.iu.edu/hypermail/linux/ke •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 2

The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 2.6.14.4, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using loadkeys. • https://www.exploit-db.com/exploits/26353 http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=334113 http://rhn.redhat.com/errata/RHBA-2007-0304.html http://secunia.com/advisories/17226 http://secunia.com/advisories/17826 http://secunia.com/advisories/17995 http://secunia.com/advisories/18203 http://secunia.com/advisories/19185 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org • CWE-264: Permissions, Privileges, and Access Controls •