Search CVE reports
51 – 60 of 137 results
CVE-2008-1367
Low prioritygcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...
7 affected packages
gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
gcc-4.3 | — | — | — | — | — |
glibc | — | — | — | — | — |
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0731
Low priorityThe Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0600
High priorityThe vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0163
Low priorityLinux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0010
High priorityThe copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0009
High priorityThe vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0007
Low prioritySome fixes available 3 of 4
Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2007-6694
Low prioritySome fixes available 4 of 5
The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0352
Low priorityThe Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-0001
Low priorityVFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.17 | — | — | — | — | — |
linux-source-2.6.20 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |