Show filters
88 Total Results
Displaying 71-80 of 88
Sort by:
Attacker Value
Unknown

CVE-2008-5182

Disclosure Date: November 21, 2008 (last updated October 04, 2023)
The inotify functionality in Linux kernel 2.6 before 2.6.28-rc5 might allow local users to gain privileges via unknown vectors related to race conditions in inotify watch removal and umount.
0
Attacker Value
Unknown

CVE-2008-5134

Disclosure Date: November 18, 2008 (last updated October 04, 2023)
Buffer overflow in the lbs_process_bss function in drivers/net/wireless/libertas/scan.c in the libertas subsystem in the Linux kernel before 2.6.27.5 allows remote attackers to have an unknown impact via an "invalid beacon/probe response."
0
Attacker Value
Unknown

CVE-2008-5025

Disclosure Date: November 17, 2008 (last updated October 04, 2023)
Stack-based buffer overflow in the hfs_cat_find_brec function in fs/hfs/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfs filesystem image with an invalid catalog namelength field, a related issue to CVE-2008-4933.
0
Attacker Value
Unknown

CVE-2008-5029

Disclosure Date: November 10, 2008 (last updated October 04, 2023)
The __scm_destroy function in net/core/scm.c in the Linux kernel 2.6.27.4, 2.6.26, and earlier makes indirect recursive calls to itself through calls to the fput function, which allows local users to cause a denial of service (panic) via vectors related to sending an SCM_RIGHTS message through a UNIX domain socket and closing file descriptors.
0
Attacker Value
Unknown

CVE-2008-4933

Disclosure Date: November 05, 2008 (last updated October 04, 2023)
Buffer overflow in the hfsplus_find_cat function in fs/hfsplus/catalog.c in the Linux kernel before 2.6.28-rc1 allows attackers to cause a denial of service (memory corruption or system crash) via an hfsplus filesystem image with an invalid catalog namelength field, related to the hfsplus_cat_build_key_uni function.
0
Attacker Value
Unknown

CVE-2008-4618

Disclosure Date: October 21, 2008 (last updated October 04, 2023)
The Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.27 does not properly handle a protocol violation in which a parameter has an invalid length, which allows attackers to cause a denial of service (panic) via unspecified vectors, related to sctp_sf_violation_paramlen, sctp_sf_abort_violation, sctp_make_abort_violation, and incorrect data types in function calls.
0
Attacker Value
Unknown

CVE-2008-4576

Disclosure Date: October 15, 2008 (last updated October 04, 2023)
sctp in Linux kernel before 2.6.25.18 allows remote attackers to cause a denial of service (OOPS) via an INIT-ACK that states the peer does not support AUTH, which causes the sctp_process_init function to clean up active transports and triggers the OOPS when the T1-Init timer expires.
0
Attacker Value
Unknown

CVE-2008-4554

Disclosure Date: October 15, 2008 (last updated October 04, 2023)
The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
0
Attacker Value
Unknown

CVE-2008-4445

Disclosure Date: October 06, 2008 (last updated October 04, 2023)
The sctp_auth_ep_set_hmacs function in net/sctp/auth.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.26.4, when the SCTP-AUTH extension is enabled, does not verify that the identifier index is within the bounds established by SCTP_AUTH_HMAC_ID_MAX, which allows local users to obtain sensitive information via a crafted SCTP_HMAC_IDENT IOCTL request involving the sctp_getsockopt function, a different vulnerability than CVE-2008-4113.
0
Attacker Value
Unknown

CVE-2008-3833

Disclosure Date: October 03, 2008 (last updated October 04, 2023)
The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210.
0