Search Results (Refine Search)
- CPE Product Version: cpe:/o:linux:linux_kernel:2.6.36.3
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2011-0521 |
The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value. Published: February 02, 2011; 6:00:32 PM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2010-4256 |
The pipe_fcntl function in fs/pipe.c in the Linux kernel before 2.6.37 does not properly determine whether a file is a named pipe, which allows local users to cause a denial of service via an F_SETPIPE_SZ fcntl call. Published: January 25, 2011; 2:00:03 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-4243 |
fs/exec.c in the Linux kernel before 2.6.37 does not enable the OOM Killer to assess use of stack memory by arrays representing the (1) arguments and (2) environment, which allows local users to cause a denial of service (memory consumption) via a crafted exec system call, aka an "OOM dodging issue," a related issue to CVE-2010-3858. Published: January 22, 2011; 5:00:04 PM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-4529 |
Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call. Published: January 13, 2011; 2:00:04 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-4527 |
The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call. Published: January 13, 2011; 2:00:04 PM -0500 |
V3.x:(not available) V2.0: 6.9 MEDIUM |
CVE-2010-4668 |
The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163. Published: January 03, 2011; 3:00:43 PM -0500 |
V3.x:(not available) V2.0: 4.7 MEDIUM |
CVE-2010-3877 |
The get_name function in net/tipc/socket.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. Published: January 03, 2011; 3:00:42 PM -0500 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-3876 |
net/packet/af_packet.c in the Linux kernel before 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the applicable structures. Published: January 03, 2011; 3:00:42 PM -0500 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-3875 |
The ax25_getname function in net/ax25/af_ax25.c in the Linux kernel before 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure. Published: January 03, 2011; 3:00:42 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-4342 |
The aun_incoming function in net/econet/af_econet.c in the Linux kernel before 2.6.37-rc6, when Econet is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending an Acorn Universal Networking (AUN) packet over UDP. Published: December 30, 2010; 2:00:04 PM -0500 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2010-4346 |
The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application. Published: December 22, 2010; 4:00:19 PM -0500 |
V3.x:(not available) V2.0: 2.1 LOW |
CVE-2010-3880 |
net/ipv4/inet_diag.c in the Linux kernel before 2.6.37-rc2 does not properly audit INET_DIAG bytecode, which allows local users to cause a denial of service (kernel infinite loop) via crafted INET_DIAG_REQ_BYTECODE instructions in a netlink message that contains multiple attribute elements, as demonstrated by INET_DIAG_BC_JMP instructions. Published: December 10, 2010; 2:00:04 PM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-4248 |
Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c. Published: November 30, 2010; 4:38:23 PM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-4249 |
The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets. Published: November 29, 2010; 11:00:04 AM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-4075 |
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel before 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. Published: November 29, 2010; 11:00:03 AM -0500 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-4073 |
The ipc subsystem in the Linux kernel before 2.6.37-rc1 does not initialize certain structures, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the (1) compat_sys_semctl, (2) compat_sys_msgctl, and (3) compat_sys_shmctl functions in ipc/compat.c; and the (4) compat_sys_mq_open and (5) compat_sys_mq_getsetattr functions in ipc/compat_mq.c. Published: November 29, 2010; 11:00:02 AM -0500 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-4072 |
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel before 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "old shm interface." Published: November 29, 2010; 11:00:02 AM -0500 |
V3.x:(not available) V2.0: 1.9 LOW |
CVE-2010-4169 |
Use-after-free vulnerability in mm/mprotect.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors involving an mprotect system call. Published: November 22, 2010; 8:00:19 AM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2010-4165 |
The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer. Published: November 22, 2010; 8:00:19 AM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2007-3945 |
Rule Set Based Access Control (RSBAC) before 1.3.5 does not properly use the Linux Kernel Crypto API for the Linux kernel 2.6.x, which allows context-dependent attackers to bypass authentication controls via unspecified vectors, possibly involving User Management password hashing and unchecked function return codes. Published: July 23, 2007; 7:30:00 PM -0400 |
V3.x:(not available) V2.0: 6.4 MEDIUM |