Search CVE reports
171 – 180 of 220 results
Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger...
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
The pkt_ioctl function in the pktcdvd block device ioctl handler (pktcdvd.c) in Linux kernel 2.6.12-rc4 and earlier calls the wrong function before passing an ioctl to the block device, which crosses security boundaries by making...
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
The fib_seq_start function in fib_hash.c in Linux kernel allows local users to cause a denial of service (system crash) via /proc/net/route.
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address.
1 affected package
linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.17 | — | — | — | — |
Integer overflow in Linux kernel 2.6 allows local users to overwrite kernel memory by writing to a sysfs file.
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Linux kernel 2.6 before 2.6.11 does not restrict access to the N_MOUSE line discipline for a TTY, which allows local users to gain privileges by injecting mouse or keyboard events into other user sessions.
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |