Show filters
305 Total Results
Displaying 211-220 of 305
Sort by:
Attacker Value
Unknown

CVE-2010-3876

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
0
Attacker Value
Unknown

CVE-2010-4162

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.
0
Attacker Value
Unknown

CVE-2010-4158

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.
0
Attacker Value
Unknown

CVE-2010-4258

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The do_exit function in kernel/exit.c in the Linux kernel before 2.6.36.2 does not properly handle a KERNEL_DS get_fs value, which allows local users to bypass intended access_ok restrictions, overwrite arbitrary kernel memory locations, and gain privileges by leveraging a (1) BUG, (2) NULL pointer dereference, or (3) page fault, as demonstrated by vectors involving the clear_child_tid feature and the splice system call.
0
Attacker Value
Unknown

CVE-2010-4157

Disclosure Date: December 10, 2010 (last updated October 04, 2023)
Integer overflow in the ioc_general function in drivers/scsi/gdth.c in the Linux kernel before 2.6.36.1 on 64-bit platforms allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large argument in an ioctl call.
0
Attacker Value
Unknown

CVE-2010-3861

Disclosure Date: December 10, 2010 (last updated October 04, 2023)
The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.
0
Attacker Value
Unknown

CVE-2010-4008

Disclosure Date: December 07, 2010 (last updated October 04, 2023)
libxml2 before 2.7.8, as used in Google Chrome before 7.0.517.44, Apple Safari 5.0.2 and earlier, and other products, reads from invalid memory locations during processing of malformed XPath expressions, which allows context-dependent attackers to cause a denial of service (application crash) via a crafted XML document.
0
Attacker Value
Unknown

CVE-2010-4180

Disclosure Date: December 06, 2010 (last updated October 04, 2023)
OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly prevent modification of the ciphersuite in the session cache, which allows remote attackers to force the downgrade to an unintended cipher via vectors involving sniffing network traffic to discover a session identifier.
0
Attacker Value
Unknown

CVE-2010-3904

Disclosure Date: December 06, 2010 (last updated June 28, 2024)
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
Attacker Value
Unknown

CVE-2010-4083

Disclosure Date: November 30, 2010 (last updated October 04, 2023)
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
0