The Linux kernel failed to properly initialize some entries the proto_ops struct for several protocols, leading to NULL being derefenced and used as a function pointer. By using mmap(2) to map page 0, an attacker can execute arbitrary code in the context of the kernel. Several public exploits exist for this vulnerability, including spender's wunderbar_emporium and rcvalle's ppc port, sock_sendpage.c. All Linux 2.4/2.6 versions since May 2001 are believed to be affected: 2.4.4 up to and including 2.4.37.4; 2.6.0 up to and including 2.6.30.4
9bd69f05ada8cee6b76af8cc4636ab3a3a49a49bfad809f7b97fefaea4e48bb0
Libc's sigqueue() function has not been updated to mitigate spoofing of the TGKILL si_code. Because of this, userland is unable to trust the pid and uid information of a TKILL signal.
da60bcd9f8399fae09da3a1f99b2b0a7f2508fe1068f4bbb527f9eba681e9a05
VMWare Workstation Virtual 8086 Linux Local ring0 exploit.
8104afbfcccb8e58dfb2979ea634a0801853cd451040e803ba52fb9281ac036d
This Metasploit module exploits a stack-based buffer overflow in the Madwifi driver.
0754c28ffae1c6acf4d1bb93d5f0ef0b22f7d54c1e399116520b529c45ac5417
This Metasploit module exploits a stack overflow in apply.cgi on the Linksys WRT54G and WRT54GS routers. According to iDefense who discovered this vulnerability, all WRT54G versions prior to 4.20.7 and all WRT54GS version prior to 1.05.2 may be be affected.
05f730badb59943ab48414e62810156de18000b427d38198a0facb7c98a34364
Iret #GP may suffer from a privilege escalation vulnerability due to a pre-commit handling failure.
1d79c7e09132c4b89fc124aeed234ca587643164955bcf1f2e6c6711647530a3
The wireless drivers in some Wi-Fi access points (such as the MARVELL-based Linksys WAP4400N) do not correctly parse some malformed 802.11 frames, allowing for denial of service and possible code execution.
1a181ff342a3f2e4a532d4f63245f3886efc056a407e5ba031eaab9f54c9e7ff
The wireless drivers in some Wi-Fi access points (such as the ATHEROS-based Linksys WRT350N) do not correctly parse the Atheros vendor specific information element included in association requests allowing for denial of service or possible code execution.
65bd74141ad942f7b06d4dba223152dea500c38738174396183436ef7ee12619
The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from a NULL SSID association request vulnerability that allows for denial of service and possibly code execution.
ccb13de54f066e877156a14ba07fa1ac4f865e9ef7de15ecd8de515a0d4f33f9
The Netgear WN802T (firmware 1.3.16) with the MARVELL 88W8361P-BEM1 chipset suffers from an overflow vulnerability when parsing malformed EAPoL-Key packets.
38d2065be0b8a4aeb8224079f08d4c79ba5ac17ce0b4e9162721a30007efe569
There is a buffer overflow in the Madwifi Atheros driver in some functions called by SIOCSIWSCAN ioctl.
ae78388667ab3deb4319d8f83bc674032a7c7b8df47d26ab5490c18a34bceb0c
Linux Kernel versions 2.6.13 through 2.6.17.4 sys_prctl() local root exploit.
5efb14525ba9f4cb8aefb22893eda96c74fc409c3de28d462630484299a60fe1