Search CVE reports
51 – 60 of 220 results
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by...
4 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The random number feature in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, (1) does not properly seed pools when there is no entropy, or (2) uses an incorrect cast when extracting entropy, which might cause the...
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large...
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it...
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
The nl_fib_lookup function in net/ipv4/fib_frontend.c in Linux Kernel before 2.6.20.8 allows attackers to cause a denial of service (kernel panic) via NETLINK_FIB_LOOKUP replies, which trigger infinite recursion and a stack overflow.
2 affected packages
linux-source-2.6.15, linux-source-2.6.17
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
Some fixes available 1 of 2
The _udp_lib_get_port function in net/ipv4/udp.c in Linux kernel 2.6.21 and earlier does not prevent a bind to a port with a local address when there is already a bind to that port with a wildcard local address, which might allow...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The utrace support in Linux kernel 2.6.18, and other versions, allows local users to cause a denial of service (system hang) related to "MT exec + utrace_attach spin failure mode," as demonstrated by ptrace-thrash.c.
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route headers (IPV6_RTHDR_TYPE_0) that create network amplification between two routers.
3 affected packages
linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |