Max CVSS | 7.8 | Min CVSS | 4.4 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2007-2172 | 4.7 |
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, I
|
19-10-2018 - 18:59 | 22-04-2007 - 19:19 | |
CVE-2007-1730 | 6.6 |
Integer signedness error in the DCCP support in the do_dccp_getsockopt function in net/dccp/proto.c in Linux kernel 2.6.20 and later allows local users to read kernel memory or cause a denial of service (oops) via a negative optlen value.
|
16-10-2018 - 16:40 | 28-03-2007 - 10:19 | |
CVE-2007-1497 | 5.0 |
nf_conntrack in netfilter in the Linux kernel before 2.6.20.3 does not set nfctinfo during reassembly of fragmented packets, which leaves the default value as IP_CT_ESTABLISHED and might allow remote attackers to bypass certain rulesets using IPv6 fr
|
11-10-2017 - 01:31 | 16-03-2007 - 22:19 | |
CVE-2007-1388 | 4.4 |
The do_ipv6_setsockopt function in net/ipv6/ipv6_sockglue.c in Linux kernel before 2.6.20, and possibly other versions, allows local users to cause a denial of service (oops) by calling setsockopt with the IPV6_RTHDR option name and possibly a zero o
|
11-10-2017 - 01:31 | 10-03-2007 - 19:19 | |
CVE-2007-1592 | 4.9 |
net/ipv6/tcp_ipv6.c in Linux kernel 2.6.x up to 2.6.21-rc3 inadvertently copies the ipv6_fl_socklist from a listening TCP socket to child sockets, which allows local users to cause a denial of service (OOPS) or double free by opening a listening IPv6
|
11-10-2017 - 01:31 | 22-03-2007 - 19:19 | |
CVE-2007-1496 | 4.9 |
nfnetlink_log in netfilter in the Linux kernel before 2.6.20.3 allows attackers to cause a denial of service (crash) via unspecified vectors involving the (1) nfulnl_recv_config function, (2) using "multiple packets per netlink message", and (3) brid
|
11-10-2017 - 01:31 | 16-03-2007 - 22:19 | |
CVE-2007-1357 | 7.8 |
The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON c
|
08-03-2011 - 02:51 | 11-04-2007 - 00:19 |