|Max CVSS||7.8||Min CVSS||1.9||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of servi
|30-10-2018 - 16:25||18-12-2007 - 00:46|
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
|16-10-2018 - 16:42||25-04-2007 - 16:19|
VFS in the Linux kernel before 18.104.22.168, and 2.6.23.x before 22.214.171.124, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and remove directories.
|15-10-2018 - 21:56||15-01-2008 - 20:00|
Linux kernel before 126.96.36.199, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
|15-10-2018 - 21:56||08-02-2008 - 02:00|
Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 188.8.131.52 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details
|15-10-2018 - 21:48||20-12-2007 - 00:46|
The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
|15-10-2018 - 21:34||13-08-2007 - 21:17|
Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death sig
|15-10-2018 - 21:31||14-08-2007 - 17:17|
Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IE
|29-09-2017 - 01:29||06-11-2007 - 19:46|
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
|29-09-2017 - 01:29||21-11-2007 - 00:46|
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing
|29-09-2017 - 01:29||09-08-2007 - 21:17|
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
|29-09-2017 - 01:29||14-09-2007 - 01:17|
The Linux kernel before 184.108.40.206-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
|05-09-2008 - 21:35||12-02-2008 - 21:00|