Search CVE reports
41 – 50 of 137 results
Linux kernel 2.6.18, and possibly other versions, when running on AMD64 architectures, allows local users to cause a denial of service (crash) via certain ptrace calls.
4 affected packages
linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges...
4 affected packages
linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...
7 affected packages
gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gcc-4.3 | — | — | — | — |
glibc | — | — | — | — |
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.
4 affected packages
linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Linux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |