Show filters
329 Total Results
Displaying 1-10 of 329
Sort by:
Attacker Value
Unknown
CVE-2011-4348
Disclosure Date: June 08, 2013 (last updated November 08, 2023)
Race condition in the sctp_rcv function in net/sctp/input.c in the Linux kernel before 2.6.29 allows remote attackers to cause a denial of service (system hang) via SCTP packets. NOTE: in some environments, this issue exists because of an incomplete fix for CVE-2011-2482.
0
Attacker Value
Unknown
CVE-2012-3520
Disclosure Date: October 03, 2012 (last updated October 05, 2023)
The Netlink implementation in the Linux kernel before 3.2.30 does not properly handle messages that lack SCM_CREDENTIALS data, which might allow local users to spoof Netlink communication via a crafted message, as demonstrated by a message to (1) Avahi or (2) NetworkManager.
0
Attacker Value
Unknown
CVE-2011-4324
Disclosure Date: June 21, 2012 (last updated October 04, 2023)
The encode_share_access function in fs/nfs/nfs4xdr.c in the Linux kernel before 2.6.29 allows local users to cause a denial of service (BUG and system crash) by using the mknod system call with a pathname on an NFSv4 filesystem.
0
Attacker Value
Unknown
CVE-2012-0028
Disclosure Date: June 21, 2012 (last updated October 04, 2023)
The robust futex implementation in the Linux kernel before 2.6.28 does not properly handle processes that make exec system calls, which allows local users to cause a denial of service or possibly gain privileges by writing to a memory location in a child process.
0
Attacker Value
Unknown
CVE-2012-1583
Disclosure Date: June 16, 2012 (last updated October 04, 2023)
Double free vulnerability in the xfrm6_tunnel_rcv function in net/ipv6/xfrm6_tunnel.c in the Linux kernel before 2.6.22, when the xfrm6_tunnel module is enabled, allows remote attackers to cause a denial of service (panic) via crafted IPv6 packets.
0
Attacker Value
Unknown
CVE-2011-4325
Disclosure Date: January 27, 2012 (last updated October 04, 2023)
The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP.
0
Attacker Value
Unknown
CVE-2011-0726
Disclosure Date: July 18, 2011 (last updated October 04, 2023)
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
0
Attacker Value
Unknown
CVE-2011-1171
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown
CVE-2011-1170
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown
CVE-2011-1172
Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0