Page 991 of 5206 results (0.018 seconds)

CVSS: 5.0EPSS: 1%CPEs: 1EXPL: 0

The Orinoco driver (orinoco.c) in Linux kernel 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, which allows remote attackers to obtain sensitive information. • http://marc.info/?l=bugtraq&m=112914754708402&w=2 http://secunia.com/advisories/17114 http://secunia.com/advisories/17280 http://secunia.com/advisories/17364 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/17918 http://secunia.com/advisories/18562 http://secunia.com/advisories/18684 http://secunia.com/advisories/19374 http://securityreason.com/securityalert/75 http://www.debian.org/security/2006/dsa-1017 http://w •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys. • http://linux.bkbits.net:8080/linux-2.6/cset%4043483fddCiQX1WyG_orbko06TrjMVA http://secunia.com/advisories/17114 http://secunia.com/advisories/17364 http://www.redhat.com/support/errata/RHSA-2005-808.html http://www.securityfocus.com/bid/15076 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11236 https://access.redhat.com/security/cve/CVE-2005-3119 https://bugzilla.redhat.com/show_bug.cgi?id=1617788 • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 2.1EPSS: 0%CPEs: 7EXPL: 0

The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption). • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23 http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA http://secunia.com/advisories/17114 http://secunia.com/advisories/17280 http://secunia.com/advisories/17364 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.mandriva.com/security& • CWE-401: Missing Release of Memory after Effective Lifetime •

CVSS: 2.1EPSS: 0%CPEs: 22EXPL: 0

drm.c in Linux kernel 2.6.10 to 2.6.13 creates a debug file in sysfs with world-readable and world-writable permissions, which allows local users to enable DRM debugging and obtain sensitive information. • http://bugs.gentoo.org/show_bug.cgi?id=107893 http://secunia.com/advisories/17114 http://secunia.com/advisories/17280 http://www.kernel.org/hg/linux-2.6/?cmd=changeset%3Bnode=d7067d7d1f92cba14963a430cfbd53098cbbc8fd http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 http://www.securityfocus.com/advisories/9549 http://www.securityfocus.com/bid/15154 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Linux 2.6.11 on 64-bit x86 (x86_64) platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug, which allows local users to cause a denial of service. • http://freshmeat.net/articles/view/1678 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=637716a3825e186555361574aa1fa3c0ebf8018b http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=637716a3825e186555361574aa1fa3c0ebf8018b http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.securityfocus.com/bid/13904 https://exchange.xforce.ibmcloud.com/vulnerabilities/43324 •