Search CVE reports


Toggle filters

491 – 500 of 579 results


CVE-2006-1527

Medium priority
Fixed

The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function.

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1864

Medium priority
Fixed

Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863.

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1056

Medium priority

Some fixes available 6 of 7

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is...

5 affected packages

kfreebsd-5, linux-source-2.6.15, linux-source-2.6.17, xen-3.0, xen-3.1

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
kfreebsd-5
linux-source-2.6.15
linux-source-2.6.17
xen-3.0
xen-3.1
Show less packages

CVE-2006-1525

Medium priority
Fixed

ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1524

Medium priority
Not affected

madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE...

1 affected package

linux-source-2.6.15

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
Show less packages

CVE-2006-0744

Medium priority
Fixed

Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1523

Medium priority
Not affected

The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON.

1 affected package

linux-source-2.6.15

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
Show less packages

CVE-2006-1522

Medium priority
Fixed

The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1055

Medium priority
Fixed

The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2006-1066

Medium priority
Fixed

Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages