|Max CVSS||7.8||Min CVSS||1.2||Total Count||2|
|ID||CVSS||Summary||Last (major) update||Published|
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
|13-02-2023 - 02:15||27-10-2005 - 18:02|
Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
|13-02-2023 - 01:16||05-08-2005 - 04:00|
The ptrace functionality (ptrace.c) in Linux kernel 2.6 before 184.108.40.206, using CLONE_THREAD, does not use the thread group ID to check whether it is attaching to itself, which allows local users to cause a denial of service (crash).
|19-10-2018 - 15:39||23-11-2005 - 21:03|
The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) b
|19-10-2018 - 15:39||25-11-2005 - 21:03|
The time_out_leases function in locks.c for Linux kernel before 2.6.15-rc3 allows local users to cause a denial of service (kernel log message consumption) by causing a large number of broken leases, which is recorded to the log using the printk func
|19-10-2018 - 15:39||27-11-2005 - 21:03|
Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.
|19-10-2018 - 15:33||16-08-2005 - 04:00|
The sysctl functionality (sysctl.c) in Linux kernel before 220.127.116.11 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unreg
|19-10-2018 - 15:33||20-11-2005 - 22:03|
The driver for compressed ISO file systems (zisofs) in the Linux kernel before 18.104.22.168 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system.
|19-10-2018 - 15:32||23-08-2005 - 04:00|
Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl i
|03-10-2018 - 21:34||31-12-2005 - 05:00|
Memory leak in the ip6_input_finish function in ip6_input.c in Linux kernel 2.6.12 and earlier might allow attackers to cause a denial of service via malformed IPv6 packets with unspecified parameter problems, which prevents the SKB from being freed.
|03-10-2018 - 21:33||27-11-2005 - 22:03|
Memory leak in the icmp_push_reply function in Linux 2.6 before 22.214.171.124 and 2.6.13 allows remote attackers to cause a denial of service (memory consumption) via a large number of crafted packets that cause the ip_append_data function to fail, aka "D
|03-10-2018 - 21:33||27-11-2005 - 00:03|
The VT implementation (vt_ioctl.c) in Linux kernel 2.6.12, and possibly other versions including 126.96.36.199, allows local users to use the KDSKBSENT ioctl on terminals of other users and gain privileges, as demonstrated by modifying key bindings using
|03-10-2018 - 21:31||18-10-2005 - 22:02|
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
|03-10-2018 - 21:29||10-01-2005 - 05:00|
The netfilter/iptables module in Linux before 188.8.131.52 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function.
|03-10-2018 - 21:29||02-05-2005 - 04:00|
SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges.
|11-07-2017 - 01:30||27-01-2005 - 05:00|
A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a rea
|02-04-2010 - 04:50||31-12-2004 - 05:00|