[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:700243
Al Viro discovered a race condition in the TTY driver. A local attacker could exploit this to crash the system, leading to a denial of service. Dan Rosenberg discovered that the MOVE_EXT ext4 ioctl did not correctly check file permissions. A local attacker could overwrite append-only files, leading ...

oval:org.secpod.oval:def:400046
The SUSE Linux Enterprise 11 GA and openSUSE 11.1 kernels were updated to fix 3 critical security issues. Following security bugs were fixed: CVE-2010-3301: Mismatch between 32bit and 64bit register usage in the system call entry paths could be used by local attackers to gain root privileges. This p ...

oval:org.secpod.oval:def:700104
Gael Delalleu, Rafal Wojtczuk, and Brad Spengler discovered that the memory manager did not properly handle when applications grow stacks into adjacent memory regions. A local attacker could exploit this to gain control of certain applications, potentially leading to privilege escalation, as demonst ...

oval:org.secpod.oval:def:400055
The openSUSE 11.3 kernel was updated to version 2.6.34.7. The update fixes lots of bugs and security issues. A major regression in handling some USB Input devices introduced by the previous update was fixed. We also fixed a lot of bugs in the ATH5K wireless driver. Following security issues were fi ...

oval:org.secpod.oval:def:400039
This update of the openSUSE 11.3 kernel fixes two local root exploits, various other security issues and some bugs. Following security issues are fixed by this update: CVE-2010-3301: Mismatch between 32bit and 64bit register usage in the system call entry path could be used by local attackers to gai ...

oval:org.secpod.oval:def:600095
CVE-2009-4895 Kyle Bader reported an issue in the tty subsystem that allows local users to create a denial of service . CVE-2010-2226 Dan Rosenberg reported an issue in the xfs filesystem that allows local users to copy and read a file owned by another user, for which they only have write permission ...

oval:org.secpod.oval:def:100507
The kernel package contains the Linux kernel , the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.

oval:org.secpod.oval:def:301142
Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount symlinks, which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW. The tc_fill_tclass function in net/sched/sch_api.c ...

oval:org.secpod.oval:def:301173
Some vulnerabilities were discovered and corrected in the Linux 2.6 kernel: fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always follow NFS automount symlinks, which allows attackers to have an unknown impact, related to LOOKUP_FOLLOW. The tc_fill_tclass function in net/sched/sch_api.c ...

oval:org.secpod.oval:def:400048
This openSUSE 11.2 kernel was updated to 2.6.31.14, fixing several security issues and bugs. A lot of ext4 filesystem stability fixes were also added. Following security issues have been fixed: CVE-2010-3301: Mismatch between 32bit and 64bit register usage in the system call entry path could be used ...

CPE    4
cpe:/o:opensuse:opensuse:11.3
cpe:/o:debian:debian_linux:5.0
cpe:/o:linux:linux_kernel
cpe:/o:fedoraproject:fedora:12
...
CWE    1
CWE-190
*CVE
CVE-2010-2959

© SecPod Technologies