Show filters
314 Total Results
Displaying 41-50 of 314
Sort by:
Attacker Value
Unknown
CVE-2011-1768
Disclosure Date: June 13, 2012 (last updated October 04, 2023)
The tunnels implementation in the Linux kernel before 2.6.34, when tunnel functionality is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading.
0
Attacker Value
Unknown
CVE-2011-4325
Disclosure Date: January 27, 2012 (last updated October 04, 2023)
The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP.
0
Attacker Value
Unknown
CVE-2011-0726
Disclosure Date: July 18, 2011 (last updated October 04, 2023)
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
0
Attacker Value
Unknown
CVE-2011-1171
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown
CVE-2011-1170
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown
CVE-2011-1172
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown
CVE-2011-1748
Disclosure Date: May 09, 2011 (last updated October 04, 2023)
The raw_release function in net/can/raw.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
0
Attacker Value
Unknown
CVE-2011-1598
Disclosure Date: May 09, 2011 (last updated October 04, 2023)
The bcm_release function in net/can/bcm.c in the Linux kernel before 2.6.39-rc6 does not properly validate a socket data structure, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a crafted release operation.
0
Attacker Value
Unknown
CVE-2011-1090
Disclosure Date: May 09, 2011 (last updated October 04, 2023)
The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
0
Attacker Value
Unknown
CVE-2011-0714
Disclosure Date: May 04, 2011 (last updated October 04, 2023)
Use-after-free vulnerability in a certain Red Hat patch for the RPC server sockets functionality in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 might allow remote attackers to cause a denial of service (crash) via malformed data in a packet, related to lockd and the svc_xprt_received function.
0