|Max CVSS||10.0||Min CVSS||1.9||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
drivers/firmware/dell_rbu.c in the Linux kernel before 22.214.171.124, and 2.6.28.x before 126.96.36.199, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size
|08-11-2018 - 20:20||28-01-2009 - 18:30|
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 188.8.131.52 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, l
|11-10-2018 - 21:01||26-01-2009 - 15:30|
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting thi
|11-10-2018 - 20:58||27-02-2009 - 17:30|
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
|10-10-2018 - 19:36||27-04-2009 - 18:00|
The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies
|10-10-2018 - 19:36||22-04-2009 - 15:30|
nfsd in the Linux kernel before 184.108.40.206 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash o
|10-10-2018 - 19:32||25-03-2009 - 01:30|
The audit_syscall_entry function in the Linux kernel 220.127.116.11 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass
|10-10-2018 - 19:31||06-03-2009 - 11:30|
The sock_getsockopt function in net/core/sock.c in the Linux kernel before 18.104.22.168 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt
|10-10-2018 - 19:30||22-02-2009 - 22:30|
Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
|03-10-2018 - 21:57||22-12-2008 - 15:30|
Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large
|29-09-2017 - 01:33||07-01-2009 - 19:30|
The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
|29-09-2017 - 01:32||15-10-2008 - 20:07|
The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 22.214.171.124, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_IN
|17-08-2017 - 01:30||09-03-2009 - 21:30|
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 126.96.36.199, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
|23-03-2012 - 04:00||08-04-2009 - 01:30|
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 188.8.131.52, 2.6.29 before 184.108.40.206, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of
|19-03-2012 - 04:00||08-06-2009 - 01:00|
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 220.127.116.11 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2)
|19-03-2012 - 04:00||06-03-2009 - 11:30|