Search CVE reports


Toggle filters

91 – 100 of 146 results


CVE-2007-5001

Low priority
Not affected

Linux kernel before 2.4.21 allows local users to cause a denial of service (kernel panic) via asynchronous input or output on a FIFO special file.

4 affected packages

linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-5498

Low priority
Fixed

The Xen hypervisor block backend driver for Linux kernel 2.6.18, when running on a 64-bit host with a 32-bit paravirtualized guest, allows local privileged users in the guest OS to cause a denial of service (host OS crash) via a...

9 affected packages

kvm, linux, linux-source-2.6.15, linux-source-2.6.22, qemu...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
kvm
linux
linux-source-2.6.15
linux-source-2.6.22
qemu
xen-3.0
xen-3.1
xen-3.2
xen-3.3
Show all 9 packages Show less packages

CVE-2008-1675

Low priority
Fixed

The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack...

4 affected packages

linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-1375

Medium priority
Fixed

Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges...

4 affected packages

linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-1294

Low priority
Fixed

Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits.

4 affected packages

linux, linux-source-2.6.15, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6712

Medium priority

Some fixes available 2 of 3

Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-1514

Medium priority
Not affected

arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-1367

Low priority
Not affected

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...

7 affected packages

gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
gcc-4.3
glibc
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show all 7 packages Show less packages

CVE-2008-0731

Low priority
Not affected

The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0600

High priority
Fixed

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages