Show filters
95 Total Results
Displaying 51-60 of 95
Sort by:
Attacker Value
Unknown

CVE-2009-1184

Disclosure Date: May 05, 2009 (last updated October 04, 2023)
The selinux_ip_postroute_iptables_compat function in security/selinux/hooks.c in the SELinux subsystem in the Linux kernel before 2.6.27.22, and 2.6.28.x before 2.6.28.10, when compat_net is enabled, omits calls to avc_has_perm for the (1) node and (2) port, which allows local users to bypass intended restrictions on network traffic. NOTE: this was incorrectly reported as an issue fixed in 2.6.27.21.
0
Attacker Value
Unknown

CVE-2009-1439

Disclosure Date: April 27, 2009 (last updated October 04, 2023)
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
0
Attacker Value
Unknown

CVE-2009-1192

Disclosure Date: April 24, 2009 (last updated October 04, 2023)
The (1) agp_generic_alloc_page and (2) agp_generic_alloc_pages functions in drivers/char/agp/generic.c in the agp subsystem in the Linux kernel before 2.6.30-rc3 do not zero out pages that may later be available to a user-space process, which allows local users to obtain sensitive information by reading these pages.
0
Attacker Value
Unknown

CVE-2009-1360

Disclosure Date: April 22, 2009 (last updated October 04, 2023)
The __inet6_check_established function in net/ipv6/inet6_hashtables.c in the Linux kernel before 2.6.29, when Network Namespace Support (aka NET_NS) is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via vectors involving IPv6 packets.
0
Attacker Value
Unknown

CVE-2009-1337

Disclosure Date: April 22, 2009 (last updated October 04, 2023)
The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies the exit_signal field and then uses an exec system call to launch a setuid application.
0
Attacker Value
Unknown

CVE-2009-1338

Disclosure Date: April 22, 2009 (last updated October 04, 2023)
The kill_something_info function in kernel/signal.c in the Linux kernel before 2.6.28 does not consider PID namespaces when processing signals directed to PID -1, which allows local users to bypass the intended namespace isolation, and send arbitrary signals to all processes in all namespaces, via a kill command.
0
Attacker Value
Unknown

CVE-2009-1265

Disclosure Date: April 08, 2009 (last updated October 04, 2023)
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 2.6.24.4, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
0
Attacker Value
Unknown

CVE-2009-1046

Disclosure Date: March 23, 2009 (last updated October 04, 2023)
The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries.
0
Attacker Value
Unknown

CVE-2009-0835

Disclosure Date: March 06, 2009 (last updated October 04, 2023)
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343.
0
Attacker Value
Unknown

CVE-2009-0028

Disclosure Date: February 27, 2009 (last updated October 04, 2023)
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting this new process exit.
0