Search CVE reports


Toggle filters

511 – 520 of 579 results


CVE-2005-4351

Medium priority
Ignored

The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the...

4 affected packages

linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2005-3623

Medium priority
Fixed

nfs2acl.c in the Linux kernel 2.6.14.4 does not check for MAY_SATTR privilege before setting access controls (ACL) on files on exported NFS filesystems, which allows remote attackers to bypass ACLs for readonly mounted NFS filesystems.

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2005-3356

Medium priority
Fixed

The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2005-0136

Medium priority
Fixed

The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2005-3660

Medium priority
Ignored

Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing...

4 affected packages

linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
linux-source-2.6.20
linux-source-2.6.22
Show less packages

CVE-2005-3810

Medium priority
Not affected

ip_conntrack_proto_icmp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via a message without ICMP ID (ICMP_ID) information, which leads to a null dereference.

1 affected package

linux-source-2.6.15

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
Show less packages

CVE-2005-3809

Medium priority
Not affected

The nfattr_to_tcp function in ip_conntrack_proto_tcp.c in ctnetlink in Linux kernel 2.6.14 up to 2.6.14.3 allows attackers to cause a denial of service (kernel oops) via an update message without private protocol information,...

1 affected package

linux-source-2.6.15

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
Show less packages

CVE-2005-2708

Medium priority
Not affected

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of...

1 affected package

linux-source-2.6.15

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
Show less packages

CVE-2005-3119

Medium priority
Not affected

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages

CVE-2005-3055

Medium priority
Fixed

Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to...

2 affected packages

linux-source-2.6.15, linux-source-2.6.17

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
linux-source-2.6.15
linux-source-2.6.17
Show less packages