Page 997 of 5206 results (0.018 seconds)

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol. Desbordamiento de búfer en la función xdr_xcode_array2 en xdr.c en el kernel de Linux 2.6.5 y anterirores podría permitir a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante datos XDR artesanales para el protocolo nfsacl. • http://linux.bkbits.net:8080/linux-2.6/cset%4042b9c4fdYUuaq0joRUZi8W0Q-2hA1A http://lkml.org/lkml/2005/6/23/126 http://lkml.org/lkml/2005/6/23/19 http://secunia.com/advisories/16406 http://www.novell.com/linux/security/advisories/2005_44_kernel.html http://www.securityfocus.com/bid/14470 https://exchange.xforce.ibmcloud.com/vulnerabilities/21805 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array. Desbordamiento en el índice del array en la función xfrm_sk_policy_insert en xfrm_user.c en el kernel de Linux 2.6 permite que usuarios locales provoquen una denegación de servicio y posiblemente ejeucten código arbitrario mediante una valor de p->dir que sea mayor que XFRM_POLICY_OUT (usado como índice en el array sock->sk_policy). • http://secunia.com/advisories/16298 http://secunia.com/advisories/16500 http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/17826 http://secunia.com/advisories/18056 http://secunia.com/advisories/18059 http://www.debian.org/security/2005/dsa-921 http://www.debian.org/security/2005/dsa-922 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba%3Bhp=ecade4893a139cc35d • CWE-667: Improper Locking •

CVSS: 3.7EPSS: 0%CPEs: 92EXPL: 0

Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://marc.info/?l=bugtraq&m=112110120216116&w=2 http://secunia.com/advisories/15980 http://secunia.com/advisories/17002 http://secunia.com/advisories/18059 http://secunia.com/advisories/19185 http://secunia.com/advisories/19607 http://securitytracker.com/id?1014442 http://www.debian.org/security/2005/dsa-921 http://www.novell.com/linux/security/advisories/2005_44_kernel.html http://www.redhat.com •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address. La llamada a "ptrace" en el kernel de Linux 2.6.8.1 y 2.6.10 para la plataforma AMD64 permite que usuarios locales causen una denegación de servicio (caída del kernel) mediante una dirección "no-canónica". • http://secunia.com/advisories/15786 http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/18056 http://secunia.com/advisories/18059 http://www.debian.org/security/2005/dsa-921 http://www.debian.org/security/2005/dsa-922 http://www.novell.com/linux/security/advisories/2005_29_kernel.html http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.securityf •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17073 http://secunia.com/advisories/18056 http://securitytracker.com/id?1014152 http://www.debian.org/security/2005/dsa-922 http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/bid/13893 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10466 https://usn.ubuntu.com/137-1 https://access.redhat.com/security/cve/CVE •