Show filters
73 Total Results
Displaying 41-50 of 73
Sort by:
Attacker Value
Unknown

CVE-2009-2849

Disclosure Date: August 18, 2009 (last updated October 04, 2023)
The md driver (drivers/md/md.c) in the Linux kernel before 2.6.30.2 might allow local users to cause a denial of service (NULL pointer dereference) via vectors related to "suspend_* sysfs attributes" and the (1) suspend_lo_store or (2) suspend_hi_store functions. NOTE: this is only a vulnerability when sysfs is writable by an attacker.
0
Attacker Value
Unknown

CVE-2009-2846

Disclosure Date: August 18, 2009 (last updated October 04, 2023)
The eisa_eeprom_read function in the parisc isa-eeprom component (drivers/parisc/eisa_eeprom.c) in the Linux kernel before 2.6.31-rc6 allows local users to access restricted memory via a negative ppos argument, which bypasses a check that assumes that ppos is positive and causes an out-of-bounds read in the readb function.
0
Attacker Value
Unknown

CVE-2009-2407

Disclosure Date: July 31, 2009 (last updated October 04, 2023)
Heap-based buffer overflow in the parse_tag_3_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to a large encrypted key size in a Tag 3 packet.
0
Attacker Value
Unknown

CVE-2009-2406

Disclosure Date: July 31, 2009 (last updated October 04, 2023)
Stack-based buffer overflow in the parse_tag_11_packet function in fs/ecryptfs/keystore.c in the eCryptfs subsystem in the Linux kernel before 2.6.30.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving a crafted eCryptfs file, related to not ensuring that the key signature length in a Tag 11 packet is compatible with the key signature buffer size.
0
Attacker Value
Unknown

CVE-2009-1389

Disclosure Date: June 16, 2009 (last updated October 04, 2023)
Buffer overflow in the RTL8169 NIC driver (drivers/net/r8169.c) in the Linux kernel before 2.6.30 allows remote attackers to cause a denial of service (kernel memory corruption and crash) via a long packet.
0
Attacker Value
Unknown

CVE-2009-1914

Disclosure Date: June 04, 2009 (last updated October 04, 2023)
The pci_register_iommu_region function in arch/sparc/kernel/pci_common.c in the Linux kernel before 2.6.29 on the sparc64 platform allows local users to cause a denial of service (system crash) by reading the /proc/iomem file, related to uninitialized pointers and the request_resource function.
0
Attacker Value
Unknown

CVE-2009-1184

Disclosure Date: May 05, 2009 (last updated October 04, 2023)
The selinux_ip_postroute_iptables_compat function in security/selinux/hooks.c in the SELinux subsystem in the Linux kernel before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is enabled, omits calls to avc_has_perm for the (1) node and (2) port, which allows local users to bypass intended restrictions on network traffic. NOTE: this was incorrectly reported as an issue fixed in 2.6.27.21.
0
Attacker Value
Unknown

CVE-2009-1439

Disclosure Date: April 27, 2009 (last updated October 04, 2023)
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
0
Attacker Value
Unknown

CVE-2009-1192

Disclosure Date: April 24, 2009 (last updated October 04, 2023)
The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
0
Attacker Value
Unknown

CVE-2009-1360

Disclosure Date: April 22, 2009 (last updated October 04, 2023)
The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
0