Search CVE reports
1 – 10 of 220 results
CVE-2007-0001
Unknown priorityThe file watch implementation in the audit subsystem (auditctl -w) in the Red Hat Enterprise Linux (RHEL) 4 kernel 2.6.9 allows local users to cause a denial of service (kernel panic) by replacing a watched file, which does not...
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
CVE-2008-2729
Low priorityarch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0598
Low priorityUnspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-6712
Medium prioritySome fixes available 2 of 3
Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-1514
Medium priorityarch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-1367
Low prioritygcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...
7 affected packages
gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gcc-4.3 | — | — | — | — | — |
glibc | — | — | — | — | — |
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0731
Low priorityThe Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0600
High priorityThe vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0163
Low priorityLinux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0010
High priorityThe copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |