|Max CVSS||7.8||Min CVSS||1.9||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 22.214.171.124 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denia
|14-08-2020 - 15:36||12-08-2008 - 23:41|
The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might
|12-08-2020 - 19:26||04-12-2007 - 00:46|
Memory leak in the ipip6_rcv function in net/ipv6/sit.c in the Linux kernel 2.4 before 126.96.36.199 and 2.6 before 188.8.131.52 allows remote attackers to cause a denial of service (memory consumption) via network traffic to a Simple Internet Transition (SIT
|31-10-2018 - 18:55||16-05-2008 - 12:54|
Linux kernel 2.6.17 and earlier, when running on IA64 or SPARC platforms, allows local users to cause a denial of service (crash) via a malformed ELF file that triggers memory maps that cross region boundaries.
|30-10-2018 - 16:26||05-09-2006 - 19:04|
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, I
|19-10-2018 - 18:59||22-04-2007 - 19:19|
Linux kernel before 184.108.40.206, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
|15-10-2018 - 21:56||08-02-2008 - 02:00|
The (1) aac_cfg_open and (2) aac_compat_ioctl functions in the SCSI layer ioctl path in aacraid in the Linux kernel before 2.6.23-rc2 do not check permissions for ioctls, which might allow local users to cause a denial of service or gain privileges.
|15-10-2018 - 21:34||13-08-2007 - 21:17|
Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death sig
|15-10-2018 - 21:31||14-08-2007 - 17:17|
The mincore function in the Linux kernel before 220.127.116.11 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
|11-10-2017 - 01:31||20-12-2006 - 02:28|
fs/open.c in the Linux kernel before 2.6.22 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspec
|29-09-2017 - 01:32||29-09-2008 - 17:17|
The sbni_ioctl function in drivers/net/wan/sbni.c in the wan subsystem in the Linux kernel 18.104.22.168 does not check for the CAP_NET_ADMIN capability before processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3) SIOCDEVENSLAVE, or (4) SIOCDEVEMAN
|29-09-2017 - 01:31||03-09-2008 - 14:12|
The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow.
|29-09-2017 - 01:29||15-12-2007 - 01:46|
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
|29-09-2017 - 01:29||21-11-2007 - 00:46|