Show filters
314 Total Results
Displaying 1-10 of 314
Sort by:
Attacker Value
Unknown

CVE-2024-24855

Disclosure Date: February 05, 2024 (last updated February 10, 2024)
A race condition was found in the Linux kernel's scsi device driver in lpfc_unregister_fcf_rescan() function. This can result in a null pointer dereference issue, possibly leading to a kernel panic or denial of service issue.
Attacker Value
Unknown

CVE-2010-2525

Disclosure Date: June 22, 2021 (last updated November 29, 2024)
A flaw was discovered in gfs2 file system’s handling of acls (access control lists). An unprivileged local attacker could exploit this flaw to gain access or execute any file stored in the gfs2 file system.
Attacker Value
Unknown

CVE-2011-0699

Disclosure Date: February 20, 2020 (last updated February 21, 2025)
Integer signedness error in the btrfs_ioctl_space_info function in the Linux kernel 2.6.37 allows local users to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted slot value.
Attacker Value
Unknown

CVE-2011-1474

Disclosure Date: December 26, 2019 (last updated November 27, 2024)
A locally locally exploitable DOS vulnerability was found in pax-linux versions 2.6.32.33-test79.patch, 2.6.38-test3.patch, and 2.6.37.4-test14.patch. A bad bounds check in arch_get_unmapped_area_topdown triggered by programs doing an mmap after a MAP_GROWSDOWN mmap will create an infinite loop condition without releasing the VM semaphore eventually leading to a system crash.
Attacker Value
Unknown

CVE-2019-3837

Disclosure Date: April 11, 2019 (last updated November 27, 2024)
It was found that the net_dma code in tcp_recvmsg() in the 2.6.32 kernel as shipped in RHEL6 is thread-unsafe. So an unprivileged multi-threaded userspace application calling recvmsg() for the same network socket in parallel executed on ioatdma-enabled hardware with net_dma enabled can leak the memory, crash the host leading to a denial-of-service or cause a random memory corruption.
Attacker Value
Unknown

CVE-2014-3535

Disclosure Date: September 28, 2014 (last updated October 05, 2023)
include/linux/netdevice.h in the Linux kernel before 2.6.36 incorrectly uses macros for netdev_printk and its related logging implementation, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) by sending invalid packets to a VxLAN interface.
0
Attacker Value
Unknown

CVE-2014-0205

Disclosure Date: September 28, 2014 (last updated October 05, 2023)
The futex_wait function in kernel/futex.c in the Linux kernel before 2.6.37 does not properly maintain a certain reference count during requeue operations, which allows local users to cause a denial of service (use-after-free and system crash) or possibly gain privileges via a crafted application that triggers a zero count.
0
Attacker Value
Unknown

CVE-2014-0196

Disclosure Date: May 07, 2014 (last updated December 20, 2024)
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
0
Attacker Value
Unknown

CVE-2011-3593

Disclosure Date: June 08, 2013 (last updated October 05, 2023)
A certain Red Hat patch to the vlan_hwaccel_do_receive function in net/8021q/vlan_core.c in the Linux kernel 2.6.32 on Red Hat Enterprise Linux (RHEL) 6 allows remote attackers to cause a denial of service (system crash) via priority-tagged VLAN frames.
0
Attacker Value
Unknown

CVE-2013-2017

Disclosure Date: May 03, 2013 (last updated October 05, 2023)
The veth (aka virtual Ethernet) driver in the Linux kernel before 2.6.34 does not properly manage skbs during congestion, which allows remote attackers to cause a denial of service (system crash) by leveraging lack of skb consumption in conjunction with a double-free error.
0