Search CVE reports
11 – 20 of 146 results
CVE-2009-0834
Low priorityThe audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0748
Low priorityThe ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0747
Low priorityThe ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0746
Low priorityThe make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0745
Low priorityThe ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0028
Low priorityThe clone system call in the Linux kernel 2.6.28 and earlier allows local users to send arbitrary signals to a parent process from an unprivileged child process by launching an additional child process with the CLONE_PARENT flag,...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0676
Medium priorityThe sock_getsockopt function in net/core/sock.c in the Linux kernel before 2.6.28.6 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel memory via...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0675
Low priorityThe skfp_ioctl function in drivers/net/skfp/skfddi.c in the Linux kernel before 2.6.28.6 permits SKFP_CLR_STATS requests only when the CAP_NET_ADMIN capability is absent, instead of when this capability is present, which allows...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2009-0605
Medium priorityStack consumption vulnerability in the do_page_fault function in arch/x86/mm/fault.c in the Linux kernel before 2.6.28.5 allows local users to cause a denial of service (memory corruption) or possibly gain privileges via...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |
CVE-2008-6107
Low priorityThe (1) sys32_mremap function in arch/sparc64/kernel/sys_sparc32.c, the (2) sparc_mmap_check function in arch/sparc/kernel/sys_sparc.c, and the (3) sparc64_mmap_check function in arch/sparc64/kernel/sys_sparc.c, in the Linux...
3 affected packages
linux, linux-source-2.6.15, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
linux | — | — | — | — | — |
linux-source-2.6.15 | — | — | — | — | — |
linux-source-2.6.22 | — | — | — | — | — |