Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
linux linux kernel 2.6.37 vulnerabilities and exploits
(subscribe to this query)
187
VMScore
CVE-2010-4346
The install_special_mapping function in mm/mmap.c in the Linux kernel prior to 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a...
Linux Linux Kernel 2.6.37
Linux Linux Kernel
170
VMScore
CVE-2011-0006
The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel prior to 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by le...
Linux Linux Kernel
Linux Linux Kernel 2.6.36.3
Linux Linux Kernel 2.6.36.1
Linux Linux Kernel 2.6.36.2
170
VMScore
CVE-2010-4075
The uart_get_count function in drivers/serial/serial_core.c in the Linux kernel prior to 2.6.37-rc1 does not properly initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call.
Linux Linux Kernel
169
VMScore
CVE-2010-3876
net/packet/af_packet.c in the Linux kernel prior to 2.6.37-rc2 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_RAW capability to read copies of the appl...
Linux Linux Kernel 2.6.37
Linux Linux Kernel
Suse Linux Enterprise Server 10
Suse Linux Enterprise Server 9
Opensuse Opensuse 11.2
Opensuse Opensuse 11.3
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Real Time Extension 11
Debian Debian Linux 5.0
169
VMScore
CVE-2010-3877
The get_name function in net/tipc/socket.c in the Linux kernel prior to 2.6.37-rc2 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory by reading a copy of this structure.
Linux Linux Kernel 2.6.37
Linux Linux Kernel
Debian Debian Linux 5.0
169
VMScore
CVE-2010-4072
The copy_shmid_to_user function in ipc/shm.c in the Linux kernel prior to 2.6.37-rc1 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via vectors related to the shmctl system call and the "...
Linux Linux Kernel
Linux Linux Kernel 2.6.37
Suse Linux Enterprise Server 10
Suse Linux Enterprise Desktop 11
Suse Linux Enterprise Server 11
Suse Linux Enterprise Server 9
Opensuse Opensuse 11.3
Suse Linux Enterprise Desktop 10
Suse Linux Enterprise Software Development Kit 10
Suse Linux Enterprise Real Time Extension 11
Debian Debian Linux 5.0
Canonical Ubuntu Linux 10.10
Canonical Ubuntu Linux 9.10
Canonical Ubuntu Linux 10.04
Canonical Ubuntu Linux 6.06
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-37316
firmware
CVE-2024-30078
CVE-2024-5995
remote code execution
logic flaw
CVE-2024-20693
CVE-2024-37315
CVE-2024-5464
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5