Search CVE reports
131 – 140 of 146 results
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The Linux kernel 2.6.20 and 2.6.21 does not properly handle an invalid LDT segment selector in %cs (the xcs field) during ptrace single-step operations, which allows local users to cause a denial of service (NULL dereference and...
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The process scheduler in the Linux kernel 2.6.16 gives preference to "interactive" processes that perform voluntary sleeps, which allows local users to cause a denial of service (CPU consumption), as described in "Secretly...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Unspecified vulnerability in the kernel in Red Hat Enterprise Linux (RHEL) 4 on the x86_64 platform allows local users to cause a denial of service (OOPS) via unspecified vectors related to the get_gate_vma function and the fuser command.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Some fixes available 3 of 4
The signal handling in the Linux kernel before 2.6.22, including 2.6.2, when running on PowerPC systems using HTX, allows local users to cause a denial of service via unspecified vectors involving floating point corruption and...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Stack-based buffer overflow in the random number generator (RNG) implementation in the Linux kernel before 2.6.22 might allow local root users to cause a denial of service or gain privileges by setting the default wakeup threshold...
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by...
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Some fixes available 1 of 2
The _udp_lib_get_port function in net/ipv4/udp.c in Linux kernel 2.6.21 and earlier does not prevent a bind to a port with a local address when there is already a bind to that port with a wildcard local address, which might allow...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |