Search CVE reports
1 – 10 of 220 results
arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
gcc 4.3.x does not generate a cld instruction while compiling functions used for string manipulation such as memcpy and memmove on x86 and i386, which can prevent the direction flag (DF) from being reset in violation of ABI...
7 affected packages
gcc-4.3, glibc, linux, linux-source-2.6.15, linux-source-2.6.17...
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
gcc-4.3 | — | — | — | — |
glibc | — | — | — | — |
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The Linux kernel before 2.6.18.8-0.8 in SUSE openSUSE 10.2 does not properly handle failure of an AppArmor change_hat system call, which might allow attackers to trigger the unconfining of an apparmored task.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The vmsplice_to_pipe function in Linux kernel 2.6.17 through 2.6.24.1 does not validate a certain userspace pointer before dereference, which allows local users to gain root privileges via crafted arguments in a vmsplice system...
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The Linux kernel 2.6.20 through 2.6.21.1 allows remote attackers to cause a denial of service (panic) via a certain IPv6 packet, possibly involving the Jumbo Payload hop-by-hop option (jumbogram).
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
Linux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |
The vmsplice_to_user function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which might allow local users to access arbitrary kernel memory locations.
5 affected packages
linux, linux-source-2.6.15, linux-source-2.6.17, linux-source-2.6.20, linux-source-2.6.22
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS |
---|---|---|---|---|
linux | — | — | — | — |
linux-source-2.6.15 | — | — | — | — |
linux-source-2.6.17 | — | — | — | — |
linux-source-2.6.20 | — | — | — | — |
linux-source-2.6.22 | — | — | — | — |