Search CVE reports
211 – 220 of 220 results
The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local...
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Race condition in SELinux 2.6.x through 2.6.9 allows local users to cause a denial of service (kernel crash) via SOCK_SEQPACKET unix domain sockets, which are not properly handled in the sock_dgram_sendmsg function.
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
A "missing serialization" error in the unix_dgram_recvmsg function in Linux 2.4.27 and earlier, and 2.6.x up to 2.6.9, allows local users to gain privileges via a race condition.
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline.
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output.
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the...
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
The smb_recv_trans2 function call in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 does not properly handle the re-assembly of fragmented packets correctly, which could allow remote samba servers to (1) read arbitrary...
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Multiple vulnerabilities in the samba filesystem (smbfs) in Linux kernel 2.4 and 2.6 allow remote samba servers to cause a denial of service (crash) or gain sensitive information from kernel memory via a samba server (1) returning...
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
The POSIX Capability Linux Security Module (LSM) for Linux kernel 2.6 does not properly handle the credentials of a process that is launched before the module is loaded, which allows local users to gain privileges.
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
3 affected packages
kernel-source-2.4.27, linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
kernel-source-2.4.27 | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |