Search CVE reports
21 – 30 of 220 results
CVE-2007-5938
Low priorityThe iwl_set_rate function in compatible/iwl3945-base.c in iwlwifi 1.1.21 and earlier dereferences an iwl_get_hw_mode return value without checking for NULL, which might allow remote attackers to cause a denial of service (kernel...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-6206
Low priorityThe do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-5494
Negligible priorityMemory leak in the Red Hat Content Accelerator kernel patch in Red Hat Enterprise Linux (RHEL) 4 and 5 allows local users to cause a denial of service (memory consumption) via a large number of open requests involving O_ATOMICLOOKUP.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-6063
Low priorityBuffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
6 affected packages
linux, linux-source, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-5500
Medium priorityThe wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2006-7229
Low priorityThe skge driver 1.5 in Linux kernel 2.6.15 on Ubuntu does not properly use the spin_lock and spin_unlock functions, which allows remote attackers to cause a denial of service (machine crash) via a flood of network traffic.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-5904
Medium prioritySome fixes available 3 of 4
Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-4997
Low priorityInteger underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-4574
Low priorityUnspecified vulnerability in the "stack unwinder fixes" in kernel in Red Hat Enterprise Linux 5, when running on AMD64 and Intel 64, allows local users to cause a denial of service via unknown vectors.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-3850
Medium priorityThe eHCA driver in Linux kernel 2.6 before 2.6.22, when running on PowerPC, does not properly map userspace resources, which allows local users to read portions of physical address space.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |