Page 993 of 5206 results (0.020 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

fs/exec.c in Linux 2.6, when one thread is tracing another thread that shares the same memory map, might allow local users to cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state. • http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c http://secunia.com/advisories/17141 http://secunia.com/advisories/18056 http://secunia.com/advisories/21136 http://secunia.com/advisories/21983 http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm http://www.debian.org/security/2005/dsa-922 http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/bro •

CVSS: 2.1EPSS: 0%CPEs: 34EXPL: 0

Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference. • http://marc.info/?l=linux-kernel&m=112766129313883 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/17918 http://secunia.com/advisories/19374 http://secunia.com/advisories/21035 http://secunia.com/advisories/21136 http://secunia.com/advisories/21465 http://secunia.com/advisories/21983 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm http://support.avaya.com/elmodocs2/security& • CWE-20: Improper Input Validation •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The sys_set_mempolicy function in mempolicy.c in Linux kernel 2.6.x allows local users to cause a denial of service (kernel BUG()) via a negative first argument. • http://linux.bkbits.net:8080/linux-2.6/cset%4042eef8b09C5r6iI0LuMe5Uy3k05c5g http://secunia.com/advisories/17141 http://secunia.com/advisories/17364 http://secunia.com/advisories/17826 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.redhat.com/support/errata/RHSA-2005-808.html http://www.securityfocus.com/archive/ •

CVSS: 2.1EPSS: 0%CPEs: 66EXPL: 0

Multiple vulnerabilities in Linux kernel before 2.6.13.2 allow local users to cause a denial of service (kernel OOPS from null dereference) via (1) fput in a 32-bit ioctl on 64-bit x86 systems or (2) sockfd_put in the 32-bit routing_ioctl function on 64-bit systems. • http://kernel.org/git/?p=linux/kernel/git/aegl/linux-2.6.git%3Ba=commitdiff%3Bh=35311d6478077f7bfe35c1c653193e658bf32686 http://kernel.org/git/?p=linux/kernel/git/chrisw/linux-2.6.13.y.git%3Ba=commit%3Bh=98debffa9114b60138b3dbd4d02ce13f01a07ab4 http://secunia.com/advisories/17826 http://secunia.com/advisories/17917 http://secunia.com/advisories/17918 http://secunia.com/advisories/18510 http://secunia.com/advisories/18562 http://secunia.com/advisories/19374 http://www.debian.org/security/ •

CVSS: 3.6EPSS: 0%CPEs: 45EXPL: 0

The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input. • http://marc.info/?l=bugtraq&m=112690609622266&w=2 http://secunia.com/advisories/16747 http://secunia.com/advisories/17073 http://secunia.com/advisories/17918 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.securityfocus.com/archive/1/419522/100/0/threaded htt • CWE-264: Permissions, Privileges, and Access Controls •