|Max CVSS||10.0||Min CVSS||1.9||Total Count||15|
|ID||CVSS||Summary||Last (major) update||Published|
The clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag, and then letting thi
|01-08-2013 - 02:03||27-02-2009 - 12:30|
The do_splice_from function in fs/splice.c in the Linux kernel before 2.6.27 does not reject file descriptors that have the O_APPEND flag set, which allows local users to bypass append mode and make arbitrary changes to other locations in the file.
|29-10-2012 - 23:17||15-10-2008 - 16:07|
The sock_getsockopt function in net/core/sock.c in the Linux kernel before 18.104.22.168 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via an SO_BSDCOMPAT getsockopt
|12-04-2012 - 00:00||22-02-2009 - 17:30|
Integer overflow in rose_sendmsg (sys/net/af_rose.c) in the Linux kernel 22.214.171.124, and other versions before 2.6.30-rc1, might allow remote attackers to obtain sensitive information via a large length value, which causes "garbage" memory to be sent.
|23-03-2012 - 00:00||07-04-2009 - 21:30|
The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 126.96.36.199, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_IN
|22-03-2012 - 00:00||09-03-2009 - 17:30|
Buffer underflow in the ibwdt_ioctl function in drivers/watchdog/ib700wdt.c in the Linux kernel before 2.6.28-rc1 might allow local users to have an unknown impact via a certain /dev/watchdog WDIOC_SETTIMEOUT IOCTL call.
|19-03-2012 - 00:00||22-12-2008 - 10:30|
Buffer overflow in net/sctp/sm_statefuns.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel before 2.6.28-git8 allows remote attackers to have an unknown impact via an FWD-TSN (aka FORWARD-TSN) chunk with a large
|19-03-2012 - 00:00||07-01-2009 - 14:30|
fs/ecryptfs/inode.c in the eCryptfs subsystem in the Linux kernel before 188.8.131.52 allows local users to cause a denial of service (fault or memory corruption), or possibly have unspecified other impact, via a readlink call that results in an error, l
|19-03-2012 - 00:00||26-01-2009 - 10:30|
drivers/firmware/dell_rbu.c in the Linux kernel before 184.108.40.206, and 2.6.28.x before 220.127.116.11, allows local users to cause a denial of service (system crash) via a read system call that specifies zero bytes from the (1) image_type or (2) packet_size
|19-03-2012 - 00:00||28-01-2009 - 13:30|
The audit_syscall_entry function in the Linux kernel 18.104.22.168 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass
|19-03-2012 - 00:00||06-03-2009 - 06:30|
The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 22.214.171.124 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2)
|19-03-2012 - 00:00||06-03-2009 - 06:30|
nfsd in the Linux kernel before 126.96.36.199 does not drop the CAP_MKNOD capability before handling a user request in a thread, which allows local users to create device nodes, as demonstrated on a filesystem that has been exported with the root_squash o
|19-03-2012 - 00:00||24-03-2009 - 21:30|
The exit_notify function in kernel/exit.c in the Linux kernel before 2.6.30-rc1 does not restrict exit signals when the CAP_KILL capability is held, which allows local users to send an arbitrary signal to a process by running a program that modifies
|19-03-2012 - 00:00||22-04-2009 - 11:30|
Buffer overflow in fs/cifs/connect.c in CIFS in the Linux kernel 2.6.29 and earlier allows remote attackers to cause a denial of service (crash) via a long nativeFileSystem field in a Tree Connect response to an SMB mount request.
|19-03-2012 - 00:00||27-04-2009 - 14:00|
The inode double locking code in fs/ocfs2/file.c in the Linux kernel 2.6.30 before 2.6.30-rc3, 2.6.27 before 188.8.131.52, 2.6.29 before 184.108.40.206, and possibly other versions down to 2.6.19 allows local users to cause a denial of service (prevention of
|19-03-2012 - 00:00||07-06-2009 - 21:00|