Your submission was sent successfully! Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

Search CVE reports


Toggle filters

51 – 60 of 137 results


CVE-2008-1367

Low priority
Not affected

gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...

7 affected packages

gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
gcc-4.3
glibc
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show all 7 packages Show less packages

CVE-2008-0731

Low priority
Not affected

The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0600

High priority
Fixed

The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0163

Low priority
Not affected

Linux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0010

High priority
Not affected

The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0009

High priority
Not affected

The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0007

Low priority

Some fixes available 3 of 4

Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2007-6694

Low priority

Some fixes available 4 of 5

The chrp_show_cpuinfo function (chrp/setup.c) in Linux kernel 2.4.21 through 2.6.18-53, when running on PowerPC, might allow local users to cause a denial of service (crash) via unknown vectors that cause the of_get_property...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0352

Low priority
Not affected

The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2008-0001

Low priority
Fixed

VFS in the Linux kernel before 2.6.22.16, and 2.6.23.x before 2.6.23.14, performs tests of access mode by using the flag variable instead of the acc_mode variable, which might allow local users to bypass intended permissions and...

5 affected packages

linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS 16.04 LTS
linux
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages