Vulnerability & Exploit Database

Displaying entries 1 - 10 of 79 in total

Results for: CVE-2007-3848 Back to search

RHSA-2009:0001: kernel security update Vulnerability

  • Severity: 8
  • Published: May 16, 2008

Updated kernel packages that fix a number of security issues are now available for Red Hat Enterprise Linux 2.1 running on 32-bit architectures. This update has been rated as having important security impact by the Red Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux operating s...

RHSA-2008:0787: kernel security update Vulnerability

  • Severity: 8
  • Published: May 16, 2008

Updated kernel packages that fix a number of security issues are now available for Red Hat Enterprise Linux 2.1 running on 64-bit architectures. This update has been rated as having important security impact by the Red Hat Security Response Team.

The kernel packages contain the Linux kernel, the core of any Linux operating s...

SUSE-SA:2008:017: Linux kernel Vulnerability

  • Severity: 7
  • Published: March 28, 2008

Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.

SUSE-SA:2007:053: Linux kernel Vulnerability

  • Severity: 8
  • Published: October 12, 2007

Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the ...

SUSE-SA:2007:051: Linux kernel Vulnerability

  • Severity: 8
  • Published: September 06, 2007

The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.

SUSE Linux Security Vulnerability: CVE-2007-3848 Vulnerability

  • Severity: 2
  • Published: August 14, 2007

Linux kernel 2.4.35 and other versions allows local users to send arbitrary signals to a child process that is running at higher privileges by causing a setuid-root parent process to die, which delivers an attacker-controlled parent process death signal (PR_SET_PDEATHSIG).

ELSA-2007-0937 Important: Enterprise Linux kernel security update Vulnerability

  • Severity: 7
  • Published: July 27, 2007

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before 2.6.22.7, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using th...

RHSA-2007:0940: kernel security update Vulnerability

  • Severity: 5
  • Published: July 20, 2007

Updated kernel packages that fix various security issues in the Red Hat Enterprise Linux 5 kernel are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain ...

CESA-2007:0940: kernel security update Vulnerability

  • Severity: 5
  • Published: July 20, 2007

Updated kernel packages that fix various security issues in the CentOS Enterprise Linux 5 kernel are now available. This update has been rated as having important security impact by the Red Hat Security Response Team.

The Linux kernel handles the basic functions of the operating system. These new kernel packages contain f...

USN-510-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 8
  • Published: July 09, 2007

The decode_choice function in net/netfilter/nf_conntrack_h323_asn1.c in the Linux kernel before 2.6.20.15, 2.6.21.x before 2.6.21.6, and before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference.