Show filters
98 Total Results
Displaying 21-30 of 98
Sort by:
Attacker Value
Unknown

CVE-2010-0741

Disclosure Date: April 12, 2010 (last updated October 04, 2023)
The virtio_net_bad_features function in hw/virtio-net.c in the virtio-net driver in the Linux kernel before 2.6.26, when used on a guest OS in conjunction with qemu-kvm 0.11.0 or KVM 83, allows remote attackers to cause a denial of service (guest OS crash, and an associated qemu-kvm process exit) by sending a large amount of network traffic to a TCP port on the guest OS, related to a virtio-net whitelist that includes an improper implementation of TCP Segment Offloading (TSO).
0
Attacker Value
Unknown

CVE-2010-1088

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount "symlinks," which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW.
0
Attacker Value
Unknown

CVE-2010-1083

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
The processcompl_compat function in drivers/usb/core/devio.c in Linux kernel 2.6.x through 2.6.32, and possibly other versions, does not clear the transfer buffer before returning to userspace when a USB command fails, which might make it easier for physically proximate attackers to obtain sensitive information (kernel memory).
0
Attacker Value
Unknown

CVE-2010-1084

Disclosure Date: April 06, 2010 (last updated October 04, 2023)
Linux kernel 2.6.18 through 2.6.33, and possibly other versions, allows remote attackers to cause a denial of service (memory corruption) via a large number of Bluetooth sockets, related to the size of sysfs files in (1) net/bluetooth/l2cap.c, (2) net/bluetooth/rfcomm/core.c, (3) net/bluetooth/rfcomm/sock.c, and (4) net/bluetooth/sco.c.
0
Attacker Value
Unknown

CVE-2010-0437

Disclosure Date: March 24, 2010 (last updated October 04, 2023)
The ip6_dst_lookup_tail function in net/ipv6/ip6_output.c in the Linux kernel before 2.6.27 does not properly handle certain circumstances involving an IPv6 TUN network interface and a large number of neighbors, which allows attackers to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via unknown vectors.
0
Attacker Value
Unknown

CVE-2010-0008

Disclosure Date: March 19, 2010 (last updated October 04, 2023)
The sctp_rcv_ootb function in the SCTP implementation in the Linux kernel before 2.6.23 allows remote attackers to cause a denial of service (infinite loop) via (1) an Out Of The Blue (OOTB) chunk or (2) a chunk of zero length.
0
Attacker Value
Unknown

CVE-2010-0415

Disclosure Date: February 17, 2010 (last updated October 04, 2023)
The do_pages_move function in mm/migrate.c in the Linux kernel before 2.6.33-rc7 does not validate node values, which allows local users to read arbitrary kernel memory locations, cause a denial of service (OOPS), and possibly have unspecified other impact by specifying a node that is not part of the kernel's node set.
0
Attacker Value
Unknown

CVE-2010-0622

Disclosure Date: February 15, 2010 (last updated October 04, 2023)
The wake_futex_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly handle certain unlock operations for a Priority Inheritance (PI) futex, which allows local users to cause a denial of service (OOPS) and possibly have unspecified other impact via vectors involving modification of the futex value from user space.
0
Attacker Value
Unknown

CVE-2009-4141

Disclosure Date: January 19, 2010 (last updated October 04, 2023)
Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file.
0
Attacker Value
Unknown

CVE-2010-0007

Disclosure Date: January 19, 2010 (last updated October 04, 2023)
net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application.
0