Show filters
157 Total Results
Displaying 21-30 of 157
Sort by:
Attacker Value
Unknown

CVE-2010-3015

Disclosure Date: August 20, 2010 (last updated October 04, 2023)
Integer overflow in the ext4_ext_get_blocks function in fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local users to cause a denial of service (BUG and system crash) via a write operation on the last block of a large file, followed by a sync operation.
0
Attacker Value
Unknown

CVE-2010-1643

Disclosure Date: June 03, 2010 (last updated October 04, 2023)
mm/shmem.c in the Linux kernel before 2.6.28-rc3, when strict overcommit is enabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors.
0
Attacker Value
Unknown

CVE-2008-7256

Disclosure Date: June 03, 2010 (last updated October 04, 2023)
mm/shmem.c in the Linux kernel before 2.6.28-rc8, when strict overcommit is enabled and CONFIG_SECURITY is disabled, does not properly handle the export of shmemfs objects by knfsd, which allows attackers to cause a denial of service (NULL pointer dereference and knfsd crash) or possibly have unspecified other impact via unknown vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-1643.
0
Attacker Value
Unknown

CVE-2010-1641

Disclosure Date: June 01, 2010 (last updated October 04, 2023)
The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request.
0
Attacker Value
Unknown

CVE-2010-1436

Disclosure Date: May 21, 2010 (last updated October 04, 2023)
gfs2 in the Linux kernel 2.6.18, and possibly other versions, does not properly handle when the gfs2_quota struct occupies two separate pages, which allows local users to cause a denial of service (kernel panic) via certain manipulations that cause an out-of-bounds write, as demonstrated by writing from an ext3 file system to a gfs2 file system.
0
Attacker Value
Unknown

CVE-2010-1173

Disclosure Date: May 07, 2010 (last updated October 04, 2023)
The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data.
0
Attacker Value
Unknown

CVE-2010-1488

Disclosure Date: April 20, 2010 (last updated October 04, 2023)
The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation.
0
Attacker Value
Unknown

CVE-2010-1162

Disclosure Date: April 20, 2010 (last updated October 04, 2023)
The release_one_tty function in drivers/char/tty_io.c in the Linux kernel before 2.6.34-rc4 omits certain required calls to the put_pid function, which has unspecified impact and local attack vectors.
0
Attacker Value
Unknown

CVE-2010-0741

Disclosure Date: April 12, 2010 (last updated October 04, 2023)
The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).
0
Attacker Value
Unknown

CVE-2010-1088

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
0