Show filters
153 Total Results
Displaying 71-80 of 153
Sort by:
Attacker Value
Unknown

CVE-2010-3876

Disclosure Date: January 03, 2011 (last updated October 04, 2023)
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures.
0
Attacker Value
Unknown

CVE-2010-3850

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The ec_dev_ioctl function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2 does not require the CAP_NET_ADMIN capability, which allows local users to bypass intended access restrictions and configure econet addresses via an SIOCSIFADDR ioctl call.
0
Attacker Value
Unknown

CVE-2010-3848

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
Stack-based buffer overflow in the econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to gain privileges by providing a large number of iovec structures.
0
Attacker Value
Unknown

CVE-2010-3849

Disclosure Date: December 30, 2010 (last updated October 04, 2023)
The econet_sendmsg function in net/econet/af_econet.c in the Linux kernel before 2.6.36.2, when an econet address is configured, allows local users to cause a denial of service (NULL pointer dereference and OOPS) via a sendmsg call that specifies a NULL value for the remote address field.
0
Attacker Value
Unknown

CVE-2010-3859

Disclosure Date: December 29, 2010 (last updated October 04, 2023)
Multiple integer signedness errors in the TIPC implementation in the Linux kernel before 2.6.36.2 allow local users to gain privileges via a crafted sendmsg call that triggers a heap-based buffer overflow, related to the tipc_msg_build function in net/tipc/msg.c and the verify_iovec function in net/core/iovec.c.
0
Attacker Value
Unknown

CVE-2010-3874

Disclosure Date: December 29, 2010 (last updated October 04, 2023)
Heap-based buffer overflow in the bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel before 2.6.36.2 on 64-bit platforms might allow local users to cause a denial of service (memory corruption) via a connect operation.
0
Attacker Value
Unknown

CVE-2010-3880

Disclosure Date: December 10, 2010 (last updated October 04, 2023)
net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions.
0
Attacker Value
Unknown

CVE-2010-3904

Disclosure Date: December 06, 2010 (last updated June 28, 2024)
The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.
Attacker Value
Unknown

CVE-2010-4083

Disclosure Date: November 30, 2010 (last updated October 04, 2023)
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
0
Attacker Value
Unknown

CVE-2010-4081

Disclosure Date: November 30, 2010 (last updated October 04, 2023)
The snd_hdspm_hwdep_ioctl function in sound/pci/rme9652/hdspm.c in the Linux kernel before 2.6.36-rc6 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via an SNDRV_HDSPM_IOCTL_GET_CONFIG_INFO ioctl call.
0