Show filters
116 Total Results
Displaying 111-116 of 116
Sort by:
Attacker Value
Unknown
CVE-2006-0557
Disclosure Date: March 12, 2006 (last updated February 22, 2025)
sys_mbind in mempolicy.c in Linux kernel 2.6.16 and earlier does not sanity check the maxnod variable before making certain computations for the get_nodes function, which has unknown impact and attack vectors.
0
Attacker Value
Unknown
CVE-2006-0454
Disclosure Date: February 07, 2006 (last updated February 22, 2025)
Linux kernel before 2.6.15.3 down to 2.6.12, while constructing an ICMP response in icmp_send, does not properly handle when the ip_options_echo function in icmp.c fails, which allows remote attackers to cause a denial of service (crash) via vectors such as (1) record-route and (2) timestamp IP options with the needaddr bit set and a truncated value.
0
Attacker Value
Unknown
CVE-2005-3358
Disclosure Date: December 14, 2005 (last updated February 22, 2025)
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
0
Attacker Value
Unknown
CVE-2005-3857
Disclosure Date: November 27, 2005 (last updated February 22, 2025)
The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk function.
0
Attacker Value
Unknown
CVE-2005-3784
Disclosure Date: November 23, 2005 (last updated February 22, 2025)
The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.
0
Attacker Value
Unknown
CVE-2005-2709
Disclosure Date: November 20, 2005 (last updated February 22, 2025)
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
0