Show filters
46 Total Results
Displaying 1-10 of 46
Sort by:
Attacker Value
Unknown

CVE-2014-0196

Disclosure Date: May 07, 2014 (last updated December 20, 2024)
The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.
0
Attacker Value
Unknown

CVE-2012-4444

Disclosure Date: December 21, 2012 (last updated October 05, 2023)
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
0
Attacker Value
Unknown

CVE-2011-4325

Disclosure Date: January 27, 2012 (last updated October 04, 2023)
The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP.
0
Attacker Value
Unknown

CVE-2011-0726

Disclosure Date: July 18, 2011 (last updated October 04, 2023)
The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.
0
Attacker Value
Unknown

CVE-2011-1171

Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown

CVE-2011-1170

Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown

CVE-2011-1172

Disclosure Date: June 22, 2011 (last updated October 04, 2023)
net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.
0
Attacker Value
Unknown

CVE-2011-1090

Disclosure Date: May 09, 2011 (last updated October 04, 2023)
The __nfs4_proc_set_acl function in fs/nfs/nfs4proc.c in the Linux kernel before 2.6.38 stores NFSv4 ACL data in memory that is allocated by kmalloc but not properly freed, which allows local users to cause a denial of service (panic) via a crafted attempt to set an ACL.
0
Attacker Value
Unknown

CVE-2011-1577

Disclosure Date: May 03, 2011 (last updated October 04, 2023)
Heap-based buffer overflow in the is_gpt_valid function in fs/partitions/efi.c in the Linux kernel 2.6.38 and earlier allows physically proximate attackers to cause a denial of service (OOPS) or possibly have unspecified other impact via a crafted size of the EFI GUID partition-table header on removable media.
0
Attacker Value
Unknown

CVE-2011-1495

Disclosure Date: May 03, 2011 (last updated October 04, 2023)
drivers/scsi/mpt2sas/mpt2sas_ctl.c in the Linux kernel 2.6.38 and earlier does not validate (1) length and (2) offset values before performing memory copy operations, which might allow local users to gain privileges, cause a denial of service (memory corruption), or obtain sensitive information from kernel memory via a crafted ioctl call, related to the _ctl_do_mpt_command and _ctl_diag_read_buffer functions.
0