Show filters
39 Total Results
Displaying 11-20 of 39
Sort by:
Attacker Value
Unknown

CVE-2010-1173

Disclosure Date: May 07, 2010 (last updated October 04, 2023)
The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
0
Attacker Value
Unknown

CVE-2010-1088

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
0
Attacker Value
Unknown

CVE-2010-1083

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).
0
Attacker Value
Unknown

CVE-2010-1084

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
Linux kernel 2.6.18 through 2.6.33, and possibly other versions, allows remote attackers to cause a denial of service (memory corruption) via a large number of Bluetooth sockets, related to the size of sysfs files in (1) net/bluetooth/l2cap.c, (2) net/bluetooth/rfcomm/core.c, (3) net/bluetooth/rfcomm/sock.c, and (4) net/bluetooth/sco.c.
0
Attacker Value
Unknown

CVE-2009-4138

Disclosure Date: December 16, 2009 (last updated October 04, 2023)
drivers/firewire/ohci.c in the Linux kernel before 2.6.32-git9, when packet-per-buffer mode is used, allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unknown other impact via an unspecified ioctl associated with receiving an ISO packet that contains zero in the payload-length field.
0
Attacker Value
Unknown

CVE-2009-4131

Disclosure Date: December 13, 2009 (last updated October 04, 2023)
The EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel before 2.6.32-git6 allows local users to overwrite arbitrary files via a crafted request, related to insufficient checks for file permissions.
0
Attacker Value
Unknown

CVE-2009-4308

Disclosure Date: December 13, 2009 (last updated October 04, 2023)
The ext4_decode_error function in fs/ext4/super.c in the ext4 filesystem in the Linux kernel before 2.6.32 allows user-assisted remote attackers to cause a denial of service (NULL pointer dereference), and possibly have unspecified other impact, via a crafted read-only filesystem that lacks a journal.
0
Attacker Value
Unknown

CVE-2009-4307

Disclosure Date: December 13, 2009 (last updated October 04, 2023)
The ext4_fill_flex_info function in fs/ext4/super.c in the Linux kernel before 2.6.32-git6 allows user-assisted remote attackers to cause a denial of service (divide-by-zero error and panic) via a malformed ext4 filesystem containing a super block with a large FLEX_BG group size (aka s_log_groups_per_flex value).
0
Attacker Value
Unknown

CVE-2009-4306

Disclosure Date: December 13, 2009 (last updated October 04, 2023)
Unspecified vulnerability in the EXT4_IOC_MOVE_EXT (aka move extents) ioctl implementation in the ext4 filesystem in the Linux kernel 2.6.32-git6 and earlier allows local users to cause a denial of service (filesystem corruption) via unknown vectors, a different vulnerability than CVE-2009-4131.
0
Attacker Value
Unknown

CVE-2009-1298

Disclosure Date: December 08, 2009 (last updated October 04, 2023)
The ip_frag_reasm function in net/ipv4/ip_fragment.c in the Linux kernel 2.6.32-rc8, and 2.6.29 and later versions before 2.6.32, calls IP_INC_STATS_BH with an incorrect argument, which allows remote attackers to cause a denial of service (NULL pointer dereference and hang) via long IP packets, possibly related to the ip_defrag function.
0