Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Linux Kernel 2.6.x

This vulnerability report for Linux Kernel 2.6.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Linux Kernel 2.6.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Kernel.org

Product Link View Here (Link to external site)

Affected By 324 Secunia advisories
671 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 8% (25 of 324 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Linux Kernel 2.6.x, with all vendor patches applied, is rated Moderately critical .




324 Secunia Advisories in 2003-2014

Secunia has issued a total of 324 Secunia advisories in 2003-2014 for Linux Kernel 2.6.x. Currently, 8% (25 out of 324) are marked as unpatched with the most severe being rated Moderately critical

More information about the specific Secunia advisories affecting Linux Kernel 2.6.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Linux Kernel "rds_iw_laddr_check()" NULL Pointer Dereference Vulnerability
Partial Fix. Secunia Advisory 1 of 9 in 2014. 324 views.
Release Date:
2014-04-07
Secunia Advisory ID:
SA57424
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel vhost-net Segmentation Memory Disclosure Security Issue
Partial Fix. Secunia Advisory 2 of 9 in 2014. 412 views.
Release Date:
2014-03-31
Secunia Advisory ID:
SA57543
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A security issue has been reported in Linux Kernel, which can be exploited by malicious people to potentially disclose sensitive information. [Read More]


Linux Kernel SCTP Handshake NULL Pointer Dereference Vulnerability
Vendor Workaround. Secunia Advisory 3 of 9 in 2014. 600 views.
Release Date:
2014-03-21
Secunia Advisory ID:
SA57541
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "rds_ib_laddr_check()" NULL Pointer Dereference Vulnerability
Vendor Workaround. Secunia Advisory 4 of 9 in 2014. 478 views.
Release Date:
2014-03-21
Secunia Advisory ID:
SA57284
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel DCCP Packets Handling Memory Corruption Vulnerabilities
Partial Fix. Secunia Advisory 5 of 9 in 2014. 983 views.
Release Date:
2014-03-18
Secunia Advisory ID:
SA57446
Solution Status:
Partial Fix
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel Linkage Stack Instructions Handling Denial of Service Vulnerability
Partial Fix. Secunia Advisory 6 of 9 in 2014. 511 views.
Release Date:
2014-02-21
Secunia Advisory ID:
SA56963
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIPSO Option Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 7 of 9 in 2014. 437 views.
Release Date:
2014-02-20
Secunia Advisory ID:
SA56854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "ieee80211_radiotap_iterator_init()" Denial of Service Vulnerability
Partial Fix. Secunia Advisory 8 of 9 in 2014. 558 views.
Release Date:
2014-01-14
Secunia Advisory ID:
SA56282
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "recvmsg()" and "recvfrom()" Information Disclosure Weaknesses
Vendor Workaround. Secunia Advisory 9 of 9 in 2014. 624 views.
Release Date:
2014-01-06
Secunia Advisory ID:
SA56036
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses have been reported in Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "get_wchan()" Stack Frame Unwinding Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 1 of 16 in 2013. 973 views.
Release Date:
2013-12-24
Secunia Advisory ID:
SA56224
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Konstantin Khlebnikov has reported a vulnerability in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel KVM Denial of Service and Memory Corruption Vulnerabilities
Partial Fix. Secunia Advisory 2 of 16 in 2013. 1,124 views.
Release Date:
2013-12-20
Secunia Advisory ID:
SA56115
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 3 of 16 in 2013. 1,242 views.
Release Date:
2013-12-04
Secunia Advisory ID:
SA55922
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges and cause a DoS (Denial of Service). [Read More]


Linux Kernel Radiotap Header Processing Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 4 of 16 in 2013. 1,354 views.
Release Date:
2013-11-29
Secunia Advisory ID:
SA55606
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "qeth_snmp_command()" Privilege Escalation Vulnerability
Partial Fix. Secunia Advisory 5 of 16 in 2013. 1,158 views.
Release Date:
2013-11-27
Secunia Advisory ID:
SA55642
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel IPVS Two Buffer Overflow Vulnerabilities
Vendor Workaround. Secunia Advisory 6 of 16 in 2013. 922 views.
Release Date:
2013-11-20
Secunia Advisory ID:
SA55709
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel AACRAID Driver Compat IOCTL Security Bypass Security Issue
Vendor Patch. Secunia Advisory 7 of 16 in 2013. 2,349 views.
Release Date:
2013-11-04
Secunia Advisory ID:
SA55562
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel IPV4 and IPV6 UFO Packets Handling Memory Corruption Vulnerabilities
Vendor Workaround. Secunia Advisory 8 of 16 in 2013. 3,026 views.
Release Date:
2013-10-31
Secunia Advisory ID:
SA55348
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel IPV6 UFO Packets Handling Denial of Service Vulnerabilities
Vendor Workaround. Secunia Advisory 9 of 16 in 2013. 1,863 views.
Release Date:
2013-10-14
Secunia Advisory ID:
SA54767
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Ceph NULL Pointer Dereference Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 16 in 2013. 1,429 views.
Release Date:
2013-07-03
Secunia Advisory ID:
SA54042
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 16 in 2013. 1,186 views.
Release Date:
2013-06-19
Secunia Advisory ID:
SA53897
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and gain escalated privileges and by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 16 in 2013. 1,281 views.
Release Date:
2013-04-08
Secunia Advisory ID:
SA52868
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel "install_user_keyrings()" Race Condition Vulnerability
Vendor Patch. Secunia Advisory 13 of 16 in 2013. 2,212 views.
Release Date:
2013-03-07
Secunia Advisory ID:
SA52441
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "chase_port()" USB Unplugging Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 14 of 16 in 2013. 1,591 views.
Release Date:
2013-03-01
Secunia Advisory ID:
SA52343
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ptrace Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 15 of 16 in 2013. 1,437 views.
Release Date:
2013-02-18
Secunia Advisory ID:
SA52269
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel "xen_iret()" IRET Handling Vulnerability
Vendor Patch. Secunia Advisory 16 of 16 in 2013. 998 views.
Release Date:
2013-02-18
Secunia Advisory ID:
SA52270
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges. [Read More]


Linux Kernel HFS+ Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 1 of 13 in 2012. 1,177 views.
Release Date:
2012-10-09
Secunia Advisory ID:
SA50849
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel "madvise_remove()" Use-After-Free Vulnerability
Vendor Patch. Secunia Advisory 2 of 13 in 2012. 1,765 views.
Release Date:
2012-08-22
Secunia Advisory ID:
SA50310
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 13 in 2012. 1,789 views.
Release Date:
2012-08-21
Secunia Advisory ID:
SA50340
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. [Read More]


Linux Kernel Huge Pages Memory Leak Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 13 in 2012. 1,517 views.
Release Date:
2012-05-24
Secunia Advisory ID:
SA49191
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel mmap_sem Denial of Service Vulnerability
Unpatched. Secunia Advisory 5 of 13 in 2012. 1,449 views.
Release Date:
2012-05-21
Secunia Advisory ID:
SA49187
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NFSv4 Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 6 of 13 in 2012. 1,155 views.
Release Date:
2012-05-21
Secunia Advisory ID:
SA49149
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "__split_huge_page()" Race Condition Denial of Service Vulnerability
Unpatched. Secunia Advisory 7 of 13 in 2012. 1,834 views.
Release Date:
2012-03-16
Secunia Advisory ID:
SA48404
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc/<pid>/mem" Privilege Escalation Vulnerability
Vendor Workaround. Secunia Advisory 8 of 13 in 2012. 3,000 views.
Release Date:
2012-01-23
Secunia Advisory ID:
SA47378
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel KVM "syscall" Emulation and CIFS Special Files Lookup Denial of Service Vulnerabilities
Unpatched. Secunia Advisory 9 of 13 in 2012. 2,145 views.
Release Date:
2012-01-12
Secunia Advisory ID:
SA47482
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). [Read More]


Linux Kernel DRM "drm_mode_dirtyfb_ioctl()" Integer Overflow Vulnerability
Vendor Workaround. Secunia Advisory 10 of 13 in 2012. 1,758 views.
Release Date:
2012-01-11
Secunia Advisory ID:
SA47486
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "xfs_acl_from_disk()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 11 of 13 in 2012. 2,297 views.
Release Date:
2012-01-11
Secunia Advisory ID:
SA47488
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Linux Kernel "igmp_heard_query()" Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 12 of 13 in 2012. 2,377 views.
Release Date:
2012-01-10
Secunia Advisory ID:
SA47472
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel KVM KVM_ASSIGN_PCI_DEVICE IOCTL Denial of Service Vulnerability
Unpatched. Secunia Advisory 13 of 13 in 2012. 1,753 views.
Release Date:
2012-01-05
Secunia Advisory ID:
SA47431
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "SG_IO" SCSI IOCTL Privilege Escalation Vulnerability
Unpatched. Secunia Advisory 1 of 40 in 2011. 14,198 views.
Release Date:
2011-12-23
Secunia Advisory ID:
SA47296
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to gain escalated privileges. [Read More]


Linux Kernel KVM PIT Denial of Service Vulnerability
Unpatched. Secunia Advisory 2 of 40 in 2011. 1,318 views.
Release Date:
2011-12-22
Secunia Advisory ID:
SA47293
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). [Read More]


Linux Kernel B.A.T.M.A.N. "bat_socket_read()" Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 3 of 40 in 2011. 4,498 views.
Release Date:
2011-12-13
Secunia Advisory ID:
SA47199
Solution Status:
Unpatched
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Linux Kernel Two Denial of Service Vulnerabilities
Vendor Workaround. Secunia Advisory 4 of 40 in 2011. 2,200 views.
Release Date:
2011-11-14
Secunia Advisory ID:
SA46803
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "journal_get_superblock()" Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 40 in 2011. 1,653 views.
Release Date:
2011-11-14
Secunia Advisory ID:
SA46802
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel XFS "xfs_readlink()" Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 6 of 40 in 2011. 2,207 views.
Release Date:
2011-10-26
Secunia Advisory ID:
SA46591
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel ghash NULL Pointer Dereference Vulnerability
Vendor Workaround. Secunia Advisory 7 of 40 in 2011. 1,907 views.
Release Date:
2011-10-26
Secunia Advisory ID:
SA46584
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ext4 Extent Splitting Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 8 of 40 in 2011. 1,684 views.
Release Date:
2011-10-24
Secunia Advisory ID:
SA46489
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "apparmor_setprocattr()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 9 of 40 in 2011. 1,728 views.
Release Date:
2011-10-17
Secunia Advisory ID:
SA46423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS DFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 40 in 2011. 2,005 views.
Release Date:
2011-09-15
Secunia Advisory ID:
SA45936
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "CIFSFindNext()" Signedness Error Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 11 of 40 in 2011. 2,479 views.
Release Date:
2011-08-24
Secunia Advisory ID:
SA45695
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Event Overflows Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 12 of 40 in 2011. 2,037 views.
Release Date:
2011-08-16
Secunia Advisory ID:
SA45533
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Two Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 40 in 2011. 2,913 views.
Release Date:
2011-08-12
Secunia Advisory ID:
SA45489
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 40 in 2011. 2,859 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45420
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS and potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Xtensa "ptrace_setxregs()" Memory Disclosure Weakness
Vendor Patch. Secunia Advisory 15 of 40 in 2011. 2,077 views.
Release Date:
2011-07-27
Secunia Advisory ID:
SA45267
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel GFS2 / ext4 Denial of Service Vulnerabilities
Vendor Workaround. Secunia Advisory 16 of 40 in 2011. 3,065 views.
Release Date:
2011-07-14
Secunia Advisory ID:
SA45193
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Transparent Hugepage Support Denial of Service Weakness
Vendor Patch. Secunia Advisory 17 of 40 in 2011. 2,192 views.
Release Date:
2011-06-21
Secunia Advisory ID:
SA44986
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 18 of 40 in 2011. 3,663 views.
Release Date:
2011-06-03
Secunia Advisory ID:
SA44754
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), and gain escalated privileges and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel "key_replace_session_keyring()" NULL Pointer Dereference Denial of Service
Vendor Patch. Secunia Advisory 19 of 40 in 2011. 2,610 views.
Release Date:
2011-05-31
Secunia Advisory ID:
SA44747
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 40 in 2011. 3,002 views.
Release Date:
2011-05-19
Secunia Advisory ID:
SA44625
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Bluetooth Memory Leak Weaknesses
Vendor Workaround. Secunia Advisory 21 of 40 in 2011. 2,166 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44466
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 40 in 2011. 3,103 views.
Release Date:
2011-04-22
Secunia Advisory ID:
SA44248
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel NULL Pointer Dereference Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 40 in 2011. 2,329 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44220
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 40 in 2011. 2,965 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44164
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "mremap()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 25 of 40 in 2011. 2,086 views.
Release Date:
2011-04-12
Secunia Advisory ID:
SA44094
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "inotify_init1()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 26 of 40 in 2011. 2,327 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44091
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel OCFS2 Sparse Writes Information Disclosure Weakness
Vendor Patch. Secunia Advisory 27 of 40 in 2011. 2,576 views.
Release Date:
2011-03-31
Secunia Advisory ID:
SA43966
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "iriap_getvaluebyclass_indication()" Buffer Overflows
Unpatched. Secunia Advisory 28 of 40 in 2011. 2,199 views.
Release Date:
2011-03-25
Secunia Advisory ID:
SA43841
Solution Status:
Unpatched
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 40 in 2011. 3,041 views.
Release Date:
2011-03-22
Secunia Advisory ID:
SA43846
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Weaknesses
Vendor Patch. Secunia Advisory 30 of 40 in 2011. 3,064 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43806
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information and bypass certain security restrictions. [Read More]


Linux Kernel TPM Information Disclosure Weaknesses
Partial Fix. Secunia Advisory 31 of 40 in 2011. 2,618 views.
Release Date:
2011-03-14
Secunia Advisory ID:
SA43576
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "ldm_frag_add()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 32 of 40 in 2011. 2,448 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43716
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people with physical access to potentially compromise a vulnerable system. [Read More]


Linux Kernel InfiniBand Request Handling Denial of Service
Unpatched. Secunia Advisory 33 of 40 in 2011. 3,228 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43693
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 34 of 40 in 2011. 3,396 views.
Release Date:
2011-03-04
Secunia Advisory ID:
SA43594
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel epoll Denial of Service Vulnerability
Unpatched. Secunia Advisory 35 of 40 in 2011. 3,076 views.
Release Date:
2011-03-02
Secunia Advisory ID:
SA43522
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 36 of 40 in 2011. 2,581 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43537
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
DoS
Where:
Local system
Short Description:
Vasiliy Kulikov has reported a weakness and some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose system information or cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc/<pid>/" Permissions Handling Weakness
Unpatched. Secunia Advisory 37 of 40 in 2011. 3,705 views.
Release Date:
2011-02-25
Secunia Advisory ID:
SA43496
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
halfdog has discovered a weakness in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel World-Writable sysfs and procfs Files Weaknesses
Partial Fix. Secunia Advisory 38 of 40 in 2011. 2,650 views.
Release Date:
2011-02-22
Secunia Advisory ID:
SA43405
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "xfs_fs_geometry()" Memory Disclosure Weakness
Vendor Patch. Secunia Advisory 39 of 40 in 2011. 2,182 views.
Release Date:
2011-02-16
Secunia Advisory ID:
SA43358
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 40 in 2011. 4,558 views.
Release Date:
2011-01-25
Secunia Advisory ID:
SA43009
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where:
Local system
Short Description:
Some weaknesses and vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people with physical access to potentially compromise a vulnerable system and cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 47 in 2010. 3,220 views.
Release Date:
2010-12-31
Secunia Advisory ID:
SA42765
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel "irda_getsockopt()" Integer Underflow Weakness
Vendor Patch. Secunia Advisory 2 of 47 in 2010. 3,103 views.
Release Date:
2010-12-23
Secunia Advisory ID:
SA42684
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Dan Rosenberg has reported a weakness in the Linux Kernel, which can be exploited by malicious, local users to disclose system information. [Read More]


Linux Kernel "install_special_mapping()" mmap_min_addr Security Bypass Weakness
Vendor Patch. Secunia Advisory 3 of 47 in 2010. 3,041 views.
Release Date:
2010-12-10
Secunia Advisory ID:
SA42570
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Socket Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 47 in 2010. 3,072 views.
Release Date:
2010-11-24
Secunia Advisory ID:
SA42354
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel inotify Memory Leak Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 47 in 2010. 2,742 views.
Release Date:
2010-11-24
Secunia Advisory ID:
SA42365
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 47 in 2010. 3,330 views.
Release Date:
2010-11-12
Secunia Advisory ID:
SA42172
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 47 in 2010. 2,877 views.
Release Date:
2010-11-11
Secunia Advisory ID:
SA42176
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses and vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information and cause a DoS (Denial of Service). [Read More]


Linux Kernel Socket Filter Memory Leak Weakness
Vendor Patch. Secunia Advisory 8 of 47 in 2010. 3,287 views.
Release Date:
2010-11-11
Secunia Advisory ID:
SA42187
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Dan Rosenberg has reported a weakness in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel KVM Two Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 47 in 2010. 3,056 views.
Release Date:
2010-11-05
Secunia Advisory ID:
SA42148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information and cause a DoS (Denial of Service). [Read More]


Linux Kernel INET Socket Monitoring Bytecode Security Bypass
Vendor Patch. Secunia Advisory 10 of 47 in 2010. 3,740 views.
Release Date:
2010-11-05
Secunia Advisory ID:
SA42126
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "x25_parse_facilities()" Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 47 in 2010. 2,669 views.
Release Date:
2010-11-04
Secunia Advisory ID:
SA42094
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 47 in 2010. 3,254 views.
Release Date:
2010-11-04
Secunia Advisory ID:
SA42035
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak Weaknesses
Vendor Patch. Secunia Advisory 13 of 47 in 2010. 3,536 views.
Release Date:
2010-11-03
Secunia Advisory ID:
SA42061
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 47 in 2010. 3,247 views.
Release Date:
2010-10-14
Secunia Advisory ID:
SA41693
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel "snd_ctl_new()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 15 of 47 in 2010. 3,676 views.
Release Date:
2010-09-29
Secunia Advisory ID:
SA41650
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 16 of 47 in 2010. 3,475 views.
Release Date:
2010-09-22
Secunia Advisory ID:
SA41493
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), conduct session hijacking attacks, or disclose sensitive information. [Read More]


Linux Kernel Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 47 in 2010. 5,018 views.
Release Date:
2010-09-15
Secunia Advisory ID:
SA41462
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ben Hawkes has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Memory Leak Weaknesses
Partial Fix. Secunia Advisory 18 of 47 in 2010. 4,501 views.
Release Date:
2010-09-15
Secunia Advisory ID:
SA41440
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel "niu_get_ethtool_tcam_all()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 19 of 47 in 2010. 3,165 views.
Release Date:
2010-09-09
Secunia Advisory ID:
SA41378
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak and Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 20 of 47 in 2010. 4,198 views.
Release Date:
2010-09-08
Secunia Advisory ID:
SA41284
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system and potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 47 in 2010. 3,952 views.
Release Date:
2010-09-02
Secunia Advisory ID:
SA41263
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Exposure of sensitive information
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, and potentially gain escalated privileges. [Read More]


Linux Kernel "irda_bind()" Object Cleanup Vulnerability
Vendor Patch. Secunia Advisory 22 of 47 in 2010. 3,409 views.
Release Date:
2010-09-01
Secunia Advisory ID:
SA41234
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 47 in 2010. 4,275 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41245
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel CAN Broadcast Manager Integer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 47 in 2010. 3,203 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA41055
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel DRM Kernel Memory Disclosure Vulnerability
Vendor Patch. Secunia Advisory 25 of 47 in 2010. 3,169 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA40656
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 26 of 47 in 2010. 4,287 views.
Release Date:
2010-08-17
Secunia Advisory ID:
SA40965
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Linux Kernel 64bit Maximum Stack Size Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 27 of 47 in 2010. 3,645 views.
Release Date:
2010-08-17
Secunia Advisory ID:
SA41002
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Brad Spengler has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS DNS Lookup Keyring Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 28 of 47 in 2010. 3,819 views.
Release Date:
2010-07-23
Secunia Advisory ID:
SA40691
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to conduct DNS cache poisoning attacks. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 47 in 2010. 3,772 views.
Release Date:
2010-06-18
Secunia Advisory ID:
SA40205
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Two weaknesses, a security issue, and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people to disclose potentially sensitive information. [Read More]


Linux Kernel Ext4 Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 30 of 47 in 2010. 3,941 views.
Release Date:
2010-05-31
Secunia Advisory ID:
SA39982
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 31 of 47 in 2010. 4,585 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39490
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ReiserFS ".reiserfs_priv" Security Bypass
Vendor Patch. Secunia Advisory 32 of 47 in 2010. 3,544 views.
Release Date:
2010-04-09
Secunia Advisory ID:
SA39316
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "cifs_create()" NULL Pointer Dereference
Unpatched. Secunia Advisory 33 of 47 in 2010. 2,991 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39344
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel r128 NULL Pointer Dereference Vulnerability
Vendor Patch. Secunia Advisory 34 of 47 in 2010. 2,352 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39297
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 35 of 47 in 2010. 4,200 views.
Release Date:
2010-03-26
Secunia Advisory ID:
SA39080
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users or by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Video Output Status Denial of Service
Vendor Patch. Secunia Advisory 36 of 47 in 2010. 2,940 views.
Release Date:
2010-03-09
Secunia Advisory ID:
SA38863
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel hda-intel Driver "azx_position_ok()" Denial of Service
Vendor Patch. Secunia Advisory 37 of 47 in 2010. 3,999 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38718
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 38 of 47 in 2010. 3,686 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38594
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS. [Read More]


Linux Kernel USB Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 39 of 47 in 2010. 3,803 views.
Release Date:
2010-02-17
Secunia Advisory ID:
SA38601
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 47 in 2010. 4,366 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38499
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users in a KVM guest and malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 41 of 47 in 2010. 4,837 views.
Release Date:
2010-02-08
Secunia Advisory ID:
SA38502
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and potentially gain escalated privileges. [Read More]


Linux Kernel KVM "pit_ioport_read()" Denial of Service
Vendor Patch. Secunia Advisory 42 of 47 in 2010. 3,430 views.
Release Date:
2010-02-04
Secunia Advisory ID:
SA38405
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a KVM guest to cause a DoS (Denial of Service). [Read More]


Linux Kernel connector Denial of Service Security Issue
Vendor Patch. Secunia Advisory 43 of 47 in 2010. 3,303 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38317
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel 64bit Personality Handling Denial of Service
Vendor Patch. Secunia Advisory 44 of 47 in 2010. 3,787 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38354
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "do_mremap()" Vulnerabilities
Vendor Patch. Secunia Advisory 45 of 47 in 2010. 2,588 views.
Release Date:
2010-01-20
Secunia Advisory ID:
SA38229
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel FASYNC Use-After-Free Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 46 of 47 in 2010. 7,046 views.
Release Date:
2010-01-14
Secunia Advisory ID:
SA38199
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ebtables Security Bypass
Vendor Patch. Secunia Advisory 47 of 47 in 2010. 4,027 views.
Release Date:
2010-01-13
Secunia Advisory ID:
SA38133
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Ext4 Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 38 in 2009. 6,668 views.
Release Date:
2009-12-10
Secunia Advisory ID:
SA37658
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 2 of 38 in 2009. 6,107 views.
Release Date:
2009-12-04
Secunia Advisory ID:
SA37590
Solution Status:
Partial Fix
Criticality:
Impact:
Manipulation of data
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to manipulate certain data and cause a DoS (Denial of Service), and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel "gdth_read_event()" Array Indexing Vulnerability
Vendor Patch. Secunia Advisory 3 of 38 in 2009. 4,900 views.
Release Date:
2009-11-19
Secunia Advisory ID:
SA37435
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 38 in 2009. 4,501 views.
Release Date:
2009-11-17
Secunia Advisory ID:
SA37357
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 38 in 2009. 4,768 views.
Release Date:
2009-11-04
Secunia Advisory ID:
SA37233
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel connector Security Bypass
Vendor Patch. Secunia Advisory 6 of 38 in 2009. 3,786 views.
Release Date:
2009-10-27
Secunia Advisory ID:
SA37113
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 38 in 2009. 5,580 views.
Release Date:
2009-10-19
Secunia Advisory ID:
SA37086
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel 64bit Kernel Register Value Leak
Vendor Patch. Secunia Advisory 8 of 38 in 2009. 4,494 views.
Release Date:
2009-10-02
Secunia Advisory ID:
SA36927
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 38 in 2009. 3,931 views.
Release Date:
2009-09-17
Secunia Advisory ID:
SA36763
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 38 in 2009. 6,587 views.
Release Date:
2009-09-14
Secunia Advisory ID:
SA36707
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel Two Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 38 in 2009. 3,376 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36617
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Linux Kernel ".getname" Information Disclosure
Vendor Patch. Secunia Advisory 12 of 38 in 2009. 4,415 views.
Release Date:
2009-08-27
Secunia Advisory ID:
SA36438
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 38 in 2009. 5,658 views.
Release Date:
2009-08-14
Secunia Advisory ID:
SA36278
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel "mm_for_maps()" Information Disclosure
Vendor Patch. Secunia Advisory 14 of 38 in 2009. 2,839 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36265
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "clock_nanosleep()" NULL Pointer Dereference
Vendor Patch. Secunia Advisory 15 of 38 in 2009. 3,980 views.
Release Date:
2009-08-07
Secunia Advisory ID:
SA36200
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "clear_child_tid" Memory Corruption
Vendor Patch. Secunia Advisory 16 of 38 in 2009. 4,788 views.
Release Date:
2009-08-04
Secunia Advisory ID:
SA35983
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sigaltstack()" Information Disclosure
Vendor Patch. Secunia Advisory 17 of 38 in 2009. 3,896 views.
Release Date:
2009-08-04
Secunia Advisory ID:
SA36136
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel eCryptfs Two Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 38 in 2009. 5,059 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA35985
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Linux Kernel "tun_char_poll()" NULL Pointer Dereference
Vendor Patch. Secunia Advisory 19 of 38 in 2009. 4,918 views.
Release Date:
2009-07-17
Secunia Advisory ID:
SA35839
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "PER_CLEAR_ON_SETID" Security Issue
Vendor Patch. Secunia Advisory 20 of 38 in 2009. 5,622 views.
Release Date:
2009-07-13
Secunia Advisory ID:
SA35801
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel KVM and Route Flushing Denial of Service
Vendor Patch. Secunia Advisory 21 of 38 in 2009. 3,046 views.
Release Date:
2009-07-06
Secunia Advisory ID:
SA35705
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel e1000 / e1000e / RTL8169 Drivers Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 38 in 2009. 12,774 views.
Release Date:
2009-06-03
Secunia Advisory ID:
SA35265
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Security Issues
Vendor Patch. Secunia Advisory 23 of 38 in 2009. 4,277 views.
Release Date:
2009-05-18
Secunia Advisory ID:
SA35127
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS String Conversion Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 38 in 2009. 5,160 views.
Release Date:
2009-05-15
Secunia Advisory ID:
SA35107
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel NFSv4 "MAY_EXEC" Security Bypass
Vendor Patch. Secunia Advisory 25 of 38 in 2009. 4,798 views.
Release Date:
2009-05-15
Secunia Advisory ID:
SA35106
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "ptrace_attach()" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 26 of 38 in 2009. 6,060 views.
Release Date:
2009-05-04
Secunia Advisory ID:
SA34977
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Security Issues
Vendor Patch. Secunia Advisory 27 of 38 in 2009. 4,822 views.
Release Date:
2009-04-08
Secunia Advisory ID:
SA34614
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 28 of 38 in 2009. 5,449 views.
Release Date:
2009-04-08
Secunia Advisory ID:
SA34644
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and bypass certain security restrictions, and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel Denial of Service Security Issues and Vulnerability
Vendor Patch. Secunia Advisory 29 of 38 in 2009. 4,819 views.
Release Date:
2009-04-03
Secunia Advisory ID:
SA34478
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Three security issues and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


Linux Kernel Information Disclosure and Security Bypass
Vendor Patch. Secunia Advisory 30 of 38 in 2009. 6,164 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34422
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious users to bypass certain security restrictions. [Read More]


Linux Kernel 32bit/64bit System Call Security Bypass Weaknesses
Vendor Patch. Secunia Advisory 31 of 38 in 2009. 6,882 views.
Release Date:
2009-03-03
Secunia Advisory ID:
SA34084
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Two weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "clone()" Child Signal Sending Weakness
Vendor Patch. Secunia Advisory 32 of 38 in 2009. 5,225 views.
Release Date:
2009-02-25
Secunia Advisory ID:
SA34033
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 33 of 38 in 2009. 4,584 views.
Release Date:
2009-02-24
Secunia Advisory ID:
SA33977
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 34 of 38 in 2009. 5,847 views.
Release Date:
2009-02-20
Secunia Advisory ID:
SA33938
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 35 of 38 in 2009. 4,949 views.
Release Date:
2009-02-04
Secunia Advisory ID:
SA33785
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel dell_rbu Denial of Service Security Issues
Vendor Patch. Secunia Advisory 36 of 38 in 2009. 7,436 views.
Release Date:
2009-01-26
Secunia Advisory ID:
SA33656
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "keyctl_join_session_keyring()" Denial of Service
Vendor Patch. Secunia Advisory 37 of 38 in 2009. 7,307 views.
Release Date:
2009-01-19
Secunia Advisory ID:
SA33569
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel 64bit ABI System Call Parameter Sign Extension Security Issue
Vendor Patch. Secunia Advisory 38 of 38 in 2009. 7,781 views.
Release Date:
2009-01-14
Secunia Advisory ID:
SA33477
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel MIPS Syscall Denial of Service
Vendor Patch. Secunia Advisory 1 of 23 in 2008. 6,225 views.
Release Date:
2008-12-09
Secunia Advisory ID:
SA33078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 23 in 2008. 5,779 views.
Release Date:
2008-12-04
Secunia Advisory ID:
SA32933
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 23 in 2008. 9,182 views.
Release Date:
2008-11-28
Secunia Advisory ID:
SA32913
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "hfs_cat_find_brec()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 23 in 2008. 7,972 views.
Release Date:
2008-11-14
Secunia Advisory ID:
SA32719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 23 in 2008. 8,900 views.
Release Date:
2008-11-04
Secunia Advisory ID:
SA32510
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to potentially cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 23 in 2008. 6,630 views.
Release Date:
2008-10-20
Secunia Advisory ID:
SA32320
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A weakness, a security issue, and a vulnerability have been reported in the Linux kernel, which can be exploited by malicious, local users to bypass certain security restrictions and potentially gain escalated privileges. [Read More]


Linux Kernel "vmi_write_ldt_entry()" Privilege Escalation
Vendor Workaround. Secunia Advisory 7 of 23 in 2008. 7,747 views.
Release Date:
2008-10-03
Secunia Advisory ID:
SA32124
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Eugene Teo has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users in a VMI guest to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel s390 ptrace Local Denial of Service
Vendor Workaround. Secunia Advisory 8 of 23 in 2008. 4,873 views.
Release Date:
2008-09-15
Secunia Advisory ID:
SA31826
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "rt6_fill_node()" Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 9 of 23 in 2008. 7,371 views.
Release Date:
2008-08-22
Secunia Advisory ID:
SA31579
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "dccp_setsockopt_change()" Integer Overflow
Vendor Patch. Secunia Advisory 10 of 23 in 2008. 8,931 views.
Release Date:
2008-08-18
Secunia Advisory ID:
SA31509
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 11 of 23 in 2008. 9,485 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31366
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or to cause a DoS (Denial of Service). [Read More]


Linux Kernel LDT Buffer Size Handling Vulnerability
Vendor Patch. Secunia Advisory 12 of 23 in 2008. 8,479 views.
Release Date:
2008-07-24
Secunia Advisory ID:
SA31172
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 23 in 2008. 12,568 views.
Release Date:
2008-07-11
Secunia Advisory ID:
SA31048
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 23 in 2008. 10,218 views.
Release Date:
2008-06-16
Secunia Advisory ID:
SA30719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ASN.1 BER Decoding Vulnerability
Vendor Patch. Secunia Advisory 15 of 23 in 2008. 13,546 views.
Release Date:
2008-06-09
Secunia Advisory ID:
SA30580
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel SPARC Address Limit Denial of Service
Vendor Patch. Secunia Advisory 16 of 23 in 2008. 9,357 views.
Release Date:
2008-05-27
Secunia Advisory ID:
SA30258
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 23 in 2008. 13,273 views.
Release Date:
2008-05-15
Secunia Advisory ID:
SA30241
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of service), and by malicious people to potentially cause a DoS. [Read More]


Linux Kernel "fcntl_setlk()" SMP Reordered Access Vulnerability
Vendor Patch. Secunia Advisory 18 of 23 in 2008. 10,122 views.
Release Date:
2008-05-07
Secunia Advisory ID:
SA30101
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 19 of 23 in 2008. 14,707 views.
Release Date:
2008-05-02
Secunia Advisory ID:
SA30044
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS or to potentially gain escalated privileges. [Read More]


Linux Kernel "vmsplice()" System Call Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 23 in 2008. 31,327 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28835
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. [Read More]


Linux Kernel Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 21 of 23 in 2008. 15,220 views.
Release Date:
2008-02-01
Secunia Advisory ID:
SA28696
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and two vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel minix File System Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 22 of 23 in 2008. 11,116 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28654
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Directory Truncation Vulnerability
Vendor Patch. Secunia Advisory 23 of 23 in 2008. 14,689 views.
Release Date:
2008-01-15
Secunia Advisory ID:
SA28485
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and corrupt a file system. [Read More]


Linux Kernel "hrtimer_start()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 32 in 2007. 12,897 views.
Release Date:
2007-12-17
Secunia Advisory ID:
SA28105
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with an unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel "mmap_min_addr" Security Bypass
Vendor Workaround. Secunia Advisory 2 of 32 in 2007. 13,314 views.
Release Date:
2007-12-12
Secunia Advisory ID:
SA28070
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 32 in 2007. 15,291 views.
Release Date:
2007-12-05
Secunia Advisory ID:
SA27908
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or gain escalated privileges. [Read More]


Linux Kernel "isdn_net_setcfg()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 32 in 2007. 15,421 views.
Release Date:
2007-11-30
Secunia Advisory ID:
SA27842
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 32 in 2007. 15,772 views.
Release Date:
2007-11-19
Secunia Advisory ID:
SA27664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS "SendReceive()" Buffer Overflow
Vendor Workaround. Secunia Advisory 6 of 32 in 2007. 14,860 views.
Release Date:
2007-11-14
Secunia Advisory ID:
SA27666
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 32 in 2007. 14,234 views.
Release Date:
2007-11-08
Secunia Advisory ID:
SA27555
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users or by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ALSA "snd_mem_proc_read()" Information Disclosure
Vendor Patch. Secunia Advisory 8 of 32 in 2007. 12,525 views.
Release Date:
2007-09-26
Secunia Advisory ID:
SA26918
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel ptrace Single Step "CS" Null Pointer Dereference
Vendor Workaround. Secunia Advisory 9 of 32 in 2007. 12,496 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26935
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Evan Teran has reported a security issue in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ptrace Local Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 10 of 32 in 2007. 15,604 views.
Release Date:
2007-09-24
Secunia Advisory ID:
SA26934
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Wojciech Purczynski has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 11 of 32 in 2007. 14,391 views.
Release Date:
2007-08-10
Secunia Advisory ID:
SA26389
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel CIFS Signing Options Weakness
Vendor Workaround. Secunia Advisory 12 of 32 in 2007. 13,946 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26366
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel AACRAID Driver IOCTL Security Bypass
Vendor Patch. Secunia Advisory 13 of 32 in 2007. 16,303 views.
Release Date:
2007-08-06
Secunia Advisory ID:
SA26322
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Security Bypass and Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 32 in 2007. 15,374 views.
Release Date:
2007-07-09
Secunia Advisory ID:
SA25955
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and cause a DoS (Denial of Service), and malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Security Issues
Vendor Patch. Secunia Advisory 15 of 32 in 2007. 14,635 views.
Release Date:
2007-07-02
Secunia Advisory ID:
SA25895
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, to gain escalated privileges, or to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sysfs_readdir()" Denial of Service
Vendor Patch. Secunia Advisory 16 of 32 in 2007. 11,946 views.
Release Date:
2007-06-26
Secunia Advisory ID:
SA25771
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a Denial of Service (DoS). [Read More]


Linux Kernel "compat_sys_mount()" Denial of Service Security Issue
Vendor Patch. Secunia Advisory 17 of 32 in 2007. 12,799 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25682
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 32 in 2007. 17,630 views.
Release Date:
2007-06-08
Secunia Advisory ID:
SA25594
Solution Status:
Vendor Patch
Criticality:
Impact:
Brute force
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel VFAT IOCTLs and IPv6 Jumbogram Denial of Service
Vendor Patch. Secunia Advisory 19 of 32 in 2007. 12,890 views.
Release Date:
2007-06-01
Secunia Advisory ID:
SA25505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel GEODE-AES Encryption Security Issue
Vendor Patch. Secunia Advisory 20 of 32 in 2007. 13,331 views.
Release Date:
2007-05-25
Secunia Advisory ID:
SA25398
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Brute force
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 21 of 32 in 2007. 14,330 views.
Release Date:
2007-05-08
Secunia Advisory ID:
SA25163
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel netlink NETLINK_FIB_LOOKUP Denial of Service
Vendor Patch. Secunia Advisory 22 of 32 in 2007. 11,431 views.
Release Date:
2007-05-01
Secunia Advisory ID:
SA25030
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IPv6 Type 0 Route Headers and RTA_MAX Denial of Service
Vendor Patch. Secunia Advisory 23 of 32 in 2007. 15,968 views.
Release Date:
2007-04-30
Secunia Advisory ID:
SA25068
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability and a security issue have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "atalk_sum_skb()" AppleTalk Denial of Service
Vendor Patch. Secunia Advisory 24 of 32 in 2007. 12,047 views.
Release Date:
2007-04-10
Secunia Advisory ID:
SA24793
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 32 in 2007. 17,567 views.
Release Date:
2007-03-23
Secunia Advisory ID:
SA24618
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NULL Pointer Dereferences and Security Bypass
Vendor Patch. Secunia Advisory 26 of 32 in 2007. 17,023 views.
Release Date:
2007-03-14
Secunia Advisory ID:
SA24492
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Linux Kernel "ipv6_getsockopt_sticky()" DoS and Information Leak
Vendor Patch. Secunia Advisory 27 of 32 in 2007. 14,720 views.
Release Date:
2007-03-12
Secunia Advisory ID:
SA24493
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel Omnikey CardMan 4040 Driver Buffer Overflow
Vendor Patch. Secunia Advisory 28 of 32 in 2007. 15,881 views.
Release Date:
2007-03-08
Secunia Advisory ID:
SA24436
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel NFSACL "ACCESS" Denial of Service
Vendor Patch. Secunia Advisory 29 of 32 in 2007. 14,755 views.
Release Date:
2007-02-20
Secunia Advisory ID:
SA24215
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "key_alloc_serial()" Denial of Service
Vendor Patch. Secunia Advisory 30 of 32 in 2007. 12,982 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24109
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "listxattr" Memory Corruption and Denial of Service
Vendor Patch. Secunia Advisory 31 of 32 in 2007. 16,218 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23955
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Local Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 32 of 32 in 2007. 13,350 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "do_coredump()" File Overwrite Vulnerability
Vendor Patch. Secunia Advisory 1 of 44 in 2006. 13,841 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23349
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to overwrite arbitrary files. [Read More]


Linux Kernel Bluetooth CAPI Messages Denial of Service
Vendor Patch. Secunia Advisory 2 of 44 in 2006. 15,775 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23427
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Various Vulnerabilities
Partial Fix. Secunia Advisory 3 of 44 in 2006. 18,189 views.
Release Date:
2006-12-14
Secunia Advisory ID:
SA23361
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported within the Linux kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "ip_summed" Memory Corruption Vulnerability
Vendor Workaround. Secunia Advisory 4 of 44 in 2006. 13,807 views.
Release Date:
2006-12-08
Secunia Advisory ID:
SA23254
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 44 in 2006. 14,939 views.
Release Date:
2006-11-30
Secunia Advisory ID:
SA23073
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to potentially gain escalated privileges. [Read More]


Linux Kernel Fragmented IPv6 Packet Filtering Bypass
Vendor Workaround. Secunia Advisory 6 of 44 in 2006. 16,413 views.
Release Date:
2006-11-07
Secunia Advisory ID:
SA22731
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel ISO9660 Local Denial of Service
Vendor Workaround. Secunia Advisory 7 of 44 in 2006. 16,155 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22702
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IPv6 Flow Label Denial of Service
Vendor Patch. Secunia Advisory 8 of 44 in 2006. 14,501 views.
Release Date:
2006-11-01
Secunia Advisory ID:
SA22665
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 44 in 2006. 13,604 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22279
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel s390 "copy_from_user" Information Disclosure
Vendor Patch. Secunia Advisory 10 of 44 in 2006. 13,387 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22289
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. [Read More]


Linux Kernel SCTP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 11 of 44 in 2006. 13,874 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA21945
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ELF Cross-Region Mapping Denial of Service
Vendor Patch. Secunia Advisory 12 of 44 in 2006. 14,508 views.
Release Date:
2006-09-18
Secunia Advisory ID:
SA21999
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ULE Packet Handling Denial of Service
Vendor Patch. Secunia Advisory 13 of 44 in 2006. 15,004 views.
Release Date:
2006-09-11
Secunia Advisory ID:
SA21820
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Ang Way Chuang has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Uncleared HID0[31] Denial of Service
Vendor Patch. Secunia Advisory 14 of 44 in 2006. 13,197 views.
Release Date:
2006-08-21
Secunia Advisory ID:
SA21563
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 15 of 44 in 2006. 15,654 views.
Release Date:
2006-08-17
Secunia Advisory ID:
SA21515
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Ext3 Invalid Inode Number Denial of Service
Vendor Workaround. Secunia Advisory 16 of 44 in 2006. 16,732 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21369
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
James McKenzie has reported a vulnerability in Linux Kernel, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc" Race Condition Privilege Escalation
Vendor Patch. Secunia Advisory 17 of 44 in 2006. 18,513 views.
Release Date:
2006-07-17
Secunia Advisory ID:
SA21041
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel "prctl" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 18 of 44 in 2006. 19,256 views.
Release Date:
2006-07-07
Secunia Advisory ID:
SA20953
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions or potentially gain escalated privileges. [Read More]


Linux Kernel SCTP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 19 of 44 in 2006. 14,235 views.
Release Date:
2006-07-03
Secunia Advisory ID:
SA20917
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 20 of 44 in 2006. 15,633 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20703
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to cause a DoS. [Read More]


Linux Kernel SMP "/proc" Race Condition Denial of Service
Unpatched. Secunia Advisory 21 of 44 in 2006. 13,610 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20349
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Tony Griffiths has reported a vulnerability in the Linux Kernel, which can be exploited malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SNMP NAT Helper Denial of Service
Vendor Patch. Secunia Advisory 22 of 44 in 2006. 18,064 views.
Release Date:
2006-05-23
Secunia Advisory ID:
SA20225
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Netfilter Weakness and Two SCTP Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 44 in 2006. 17,493 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20185
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Two vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information, and by malicious people to cause a DoS. [Read More]


Linux Kernel "lease_init()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 24 of 44 in 2006. 14,772 views.
Release Date:
2006-05-11
Secunia Advisory ID:
SA20083
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SCTP Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 44 in 2006. 16,043 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA19990
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 26 of 44 in 2006. 16,956 views.
Release Date:
2006-05-04
Secunia Advisory ID:
SA19926
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel SMBFS chroot Directory Traversal Vulnerability
Vendor Patch. Secunia Advisory 27 of 44 in 2006. 18,091 views.
Release Date:
2006-04-28
Secunia Advisory ID:
SA19869
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel CIFS chroot Directory Traversal Vulnerability
Vendor Patch. Secunia Advisory 28 of 44 in 2006. 15,763 views.
Release Date:
2006-04-28
Secunia Advisory ID:
SA19868
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel perfmon Local Denial of Service Vulnerability
Unpatched. Secunia Advisory 29 of 44 in 2006. 13,730 views.
Release Date:
2006-04-20
Secunia Advisory ID:
SA19737
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Shared Memory Restrictions Bypass
Vendor Patch. Secunia Advisory 30 of 44 in 2006. 13,985 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19657
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel x87 Register Information Leak
Vendor Patch. Secunia Advisory 31 of 44 in 2006. 16,953 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19724
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in Linux Kernel, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. [Read More]


Linux Kernel "ip_route_input()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 32 of 44 in 2006. 17,251 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19709
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Program Control Return Denial of Service
Vendor Patch. Secunia Advisory 33 of 44 in 2006. 12,666 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19639
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability and a weakness have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "__keyring_search_one()" Denial of Service
Vendor Patch. Secunia Advisory 34 of 44 in 2006. 14,505 views.
Release Date:
2006-04-11
Secunia Advisory ID:
SA19573
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SYSFS Local Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 35 of 44 in 2006. 21,362 views.
Release Date:
2006-04-07
Secunia Advisory ID:
SA19495
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IP ID Value Increment Weakness
Partial Fix. Secunia Advisory 36 of 44 in 2006. 18,841 views.
Release Date:
2006-03-28
Secunia Advisory ID:
SA19402
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Exposure of system information
Where:
From remote
Short Description:
Marco Ivaldi has reported a weakness in the Linux kernel, which can be exploited by malicious people to disclose certain system information and potentially to bypass certain security restrictions. [Read More]


Linux Kernel IPv4 "sockaddr_in.sin_zero" Information Disclosure
Vendor Patch. Secunia Advisory 37 of 44 in 2006. 19,555 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19357
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Pavel Kankovsky has reported a weakness in the Linux kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel Netfilter Weakness and Four Vulnerabilities
Vendor Patch. Secunia Advisory 38 of 44 in 2006. 19,435 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19330
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
Where:
Local system
Short Description:
A weakness and four vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, or with unknown impacts. [Read More]


Linux Kernel "die_if_kernel()" Potential Denial of Service
Vendor Patch. Secunia Advisory 39 of 44 in 2006. 14,209 views.
Release Date:
2006-03-07
Secunia Advisory ID:
SA19078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Local Denial of Service and Information Disclosure
Vendor Patch. Secunia Advisory 40 of 44 in 2006. 24,005 views.
Release Date:
2006-03-02
Secunia Advisory ID:
SA19083
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain knowledge of potentially sensitive information. [Read More]


Linux Kernel ICMP Error Handling Denial of Service
Vendor Patch. Secunia Advisory 41 of 44 in 2006. 17,745 views.
Release Date:
2006-02-08
Secunia Advisory ID:
SA18766
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 42 of 44 in 2006. 14,183 views.
Release Date:
2006-01-17
Secunia Advisory ID:
SA18487
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, and to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 43 of 44 in 2006. 12,920 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18482
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 44 of 44 in 2006. 14,403 views.
Release Date:
2006-01-04
Secunia Advisory ID:
SA18216
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), gain knowledge of potentially sensitive information, bypass certain security restrictions, and with unknown impact. [Read More]


Linux Kernel Socket Data Buffering Denial of Service
Unpatched. Secunia Advisory 1 of 33 in 2005. 13,492 views.
Release Date:
2005-12-23
Secunia Advisory ID:
SA18205
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 33 in 2005. 17,100 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17786
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel sysctl Interface Unregistration Denial of Service
Vendor Patch. Secunia Advisory 3 of 33 in 2005. 15,516 views.
Release Date:
2005-11-09
Secunia Advisory ID:
SA17504
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Potential Buffer Overflow and Denial of Service
Vendor Patch. Secunia Advisory 4 of 33 in 2005. 16,293 views.
Release Date:
2005-11-01
Secunia Advisory ID:
SA17384
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel. Two has an unknown impact, the others can potentially be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


Linux Kernel IPv6 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 33 in 2005. 14,805 views.
Release Date:
2005-10-21
Secunia Advisory ID:
SA17261
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Tetsuo Handa has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Console Keyboard Mapping Shell Command Injection
Vendor Patch. Secunia Advisory 6 of 33 in 2005. 21,615 views.
Release Date:
2005-10-17
Secunia Advisory ID:
SA17226
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Rudolf Polzer has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Potential Denial of Service and Information Disclosure
Vendor Patch. Secunia Advisory 7 of 33 in 2005. 15,253 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17114
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Two vulnerabilities, a security issue, and a weakness have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, or by malicious people to disclose certain sensitive information. [Read More]


Linux Kernel URB and IPv6 Flowlabel Handling Denial of Service
Partial Fix. Secunia Advisory 8 of 33 in 2005. 15,118 views.
Release Date:
2005-09-27
Secunia Advisory ID:
SA16969
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities, a security issue, and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS. [Read More]


Linux Kernel "fget()" Potential Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 9 of 33 in 2005. 18,540 views.
Release Date:
2005-09-22
Secunia Advisory ID:
SA16897
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vasiliy Averin has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 33 in 2005. 21,217 views.
Release Date:
2005-09-09
Secunia Advisory ID:
SA16747
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which potentially can be exploited by malicious, local users to disclose certain sensitive information, cause a DoS (Denial of Service) and gain escalated privileges, or by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 33 in 2005. 16,341 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16494
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and bypass certain security restrictions, or by malicious people to cause a DoS. [Read More]


Linux Kernel XDR Encode/Decode Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 12 of 33 in 2005. 16,381 views.
Release Date:
2005-08-12
Secunia Advisory ID:
SA16406
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Florian Weimer has reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 33 in 2005. 18,238 views.
Release Date:
2005-08-09
Secunia Advisory ID:
SA16355
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users and potentially malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel xfrm Array Indexing Overflow Vulnerability
Vendor Patch. Secunia Advisory 14 of 33 in 2005. 16,157 views.
Release Date:
2005-08-05
Secunia Advisory ID:
SA16298
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Balazs Scheidler has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IA32 Compatibility "execve()" Buffer Overflow
Vendor Patch. Secunia Advisory 15 of 33 in 2005. 15,959 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15980
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ilja van Sprundel has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel "syscall()" Argument Handling Denial of Service
Unpatched. Secunia Advisory 16 of 33 in 2005. 16,525 views.
Release Date:
2005-06-27
Secunia Advisory ID:
SA15812
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 33 in 2005. 17,501 views.
Release Date:
2005-06-23
Secunia Advisory ID:
SA15786
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel. The first has an unknown impact, the others can be exploited by malicious, local users to cause a DoS (Denial of Service), or by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel "ptrace()" and "mmap()" Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 33 in 2005. 14,253 views.
Release Date:
2005-06-09
Secunia Advisory ID:
SA15630
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Hyper-Threading Support Information Disclosure
Vendor Workaround. Secunia Advisory 19 of 33 in 2005. 12,569 views.
Release Date:
2005-05-23
Secunia Advisory ID:
SA15457
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel pktcdvd and raw device Block Device Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 33 in 2005. 17,314 views.
Release Date:
2005-05-17
Secunia Advisory ID:
SA15392
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
alert7 has reported two vulnerabilities in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ELF Core Dump Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 21 of 33 in 2005. 16,978 views.
Release Date:
2005-05-12
Secunia Advisory ID:
SA15341
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Local Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 33 in 2005. 13,246 views.
Release Date:
2005-05-02
Secunia Advisory ID:
SA15204
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "is_hugepage_only_range()" Denial of Service
Unpatched. Secunia Advisory 23 of 33 in 2005. 10,787 views.
Release Date:
2005-04-04
Secunia Advisory ID:
SA14718
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Daniel McNeil has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 33 in 2005. 24,564 views.
Release Date:
2005-03-29
Secunia Advisory ID:
SA14713
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which can be exploited to disclose information, cause a DoS (Denial of Service), gain escalated privileges, or potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 33 in 2005. 16,005 views.
Release Date:
2005-03-18
Secunia Advisory ID:
SA14585
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, the rest can be exploited by malicious, local users, or by malicious people, to cause a DoS (Denial of Service). [Read More]


Linux Kernel PPP Server Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 26 of 33 in 2005. 17,417 views.
Release Date:
2005-03-16
Secunia Advisory ID:
SA14570
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Ben Martel and Stephen Blackheath have reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sys_epoll_wait()" Function Integer Overflow
Vendor Patch. Secunia Advisory 27 of 33 in 2005. 16,515 views.
Release Date:
2005-03-15
Secunia Advisory ID:
SA14548
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Georgi Guninski has reported a potential vulnerability in the Linux kernel, which may be exploited by malicious people to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 28 of 33 in 2005. 33,736 views.
Release Date:
2005-02-16
Secunia Advisory ID:
SA14295
Solution Status:
Partial Fix
Criticality:
Impact:
Unknown
Hijacking
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel. These can be exploited by malicious, local users to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service), or gain escalated privileges, or by malicious people to cause a DoS or bypass certain security restrictions. [Read More]


Linux Kernel Memory Disclosure and Privilege Escalation
Vendor Patch. Secunia Advisory 29 of 33 in 2005. 14,316 views.
Release Date:
2005-02-15
Secunia Advisory ID:
SA14270
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to disclose kernel memory or gain escalated privileges. [Read More]


Linux Kernel NTFS Unspecified Denial of Service
Vendor Patch. Secunia Advisory 30 of 33 in 2005. 11,837 views.
Release Date:
2005-02-07
Secunia Advisory ID:
SA14117
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Carl-Daniel Hailfinger has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Page Fault Handler Privilege Escalation
Partial Fix. Secunia Advisory 31 of 33 in 2005. 18,151 views.
Release Date:
2005-01-13
Secunia Advisory ID:
SA13822
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 32 of 33 in 2005. 21,701 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13784
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, or gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel Binary Format Loaders Privilege Escalation
Partial Fix. Secunia Advisory 33 of 33 in 2005. 16,711 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13756
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel SACF Instruction and tmpfs Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 29 in 2004. 12,061 views.
Release Date:
2004-12-27
Secunia Advisory ID:
SA13654
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Unpatched. Secunia Advisory 2 of 29 in 2004. 21,243 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13572
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. [Read More]


Linux Kernel "ip_options_get()" and "vc_resize()" Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 29 in 2004. 18,457 views.
Release Date:
2004-12-17
Secunia Advisory ID:
SA13493
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Georgi Guninski has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IGMP and "__scm_send()" Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 29 in 2004. 17,216 views.
Release Date:
2004-12-15
Secunia Advisory ID:
SA13469
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Paul Starzetz has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS, gain knowledge of sensitive information, or potentially gain escalated privileges. [Read More]


Linux Kernel "sys32_ni_syscall" / "sys32_vm86_warning" Buffer Overflows
Vendor Patch. Secunia Advisory 5 of 29 in 2004. 15,452 views.
Release Date:
2004-12-09
Secunia Advisory ID:
SA13410
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Jeremy Fitzhardinge has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Local DoS and Memory Content Disclosure Vulnerabilities
Unpatched. Secunia Advisory 6 of 29 in 2004. 17,564 views.
Release Date:
2004-11-25
Secunia Advisory ID:
SA13308
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. [Read More]


Linux Kernel smb Filesystem Implementation Multiple Vulnerabilities
Partial Fix. Secunia Advisory 7 of 29 in 2004. 22,668 views.
Release Date:
2004-11-18
Secunia Advisory ID:
SA13232
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service) or leak kernel memory. Reportedly, it is currently unclear whether some of the vulnerabilities also can be exploited for arbitrary code execution. [Read More]


Linux Kernel ELF Binary Loader Setuid File Handling Vulnerabilities
Partial Fix. Secunia Advisory 8 of 29 in 2004. 22,761 views.
Release Date:
2004-11-10
Secunia Advisory ID:
SA13126
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 29 in 2004. 16,236 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12525
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which can be exploited to disclose kernel data, cause a DoS (Denial of Service), or bypass certain security restrictions. [Read More]


Linux Kernel Firewall Logging Rules Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 29 in 2004. 19,567 views.
Release Date:
2004-10-21
Secunia Advisory ID:
SA11202
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Richard Hart has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ide-cd SG_IO Functionality Permission Bypass Vulnerability
Unpatched. Secunia Advisory 11 of 29 in 2004. 13,954 views.
Release Date:
2004-09-28
Secunia Advisory ID:
SA12498
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel NFS and ptmx Denial of Service Vulnerabilities
Unpatched. Secunia Advisory 12 of 29 in 2004. 13,294 views.
Release Date:
2004-09-02
Secunia Advisory ID:
SA12426
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, allowing malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel File Offset Pointer Handling Memory Disclosure Vulnerability
Partial Fix. Secunia Advisory 13 of 29 in 2004. 15,868 views.
Release Date:
2004-08-04
Secunia Advisory ID:
SA12210
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to disclose sensitive information in kernel memory. [Read More]


Linux Kernel File Group ID Manipulation Vulnerability
Vendor Patch. Secunia Advisory 14 of 29 in 2004. 18,853 views.
Release Date:
2004-07-02
Secunia Advisory ID:
SA11996
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From local network
Short Description:
SuSE has discovered a vulnerability in the Linux kernel, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Linux Kernel Netfilter TCP Option Matching Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 15 of 29 in 2004. 17,015 views.
Release Date:
2004-07-01
Secunia Advisory ID:
SA11980
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Adam Osuchowski and Tomasz Dubinski have reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel IEEE 1394 Driver Integer Overflow Vulnerabilities
Unpatched. Secunia Advisory 16 of 29 in 2004. 14,722 views.
Release Date:
2004-06-24
Secunia Advisory ID:
SA11931
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
infamous41md has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Various Drivers Userland Pointer Dereference Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 29 in 2004. 14,494 views.
Release Date:
2004-06-21
Secunia Advisory ID:
SA11891
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Vulnerabilities have been discovered in various drivers for the Linux kernel, which can be exploited by malicious, local users to disclose kernel memory or gain escalated privileges. [Read More]


Linux Kernel "__clear_fpu()" Macro Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 29 in 2004. 17,064 views.
Release Date:
2004-06-15
Secunia Advisory ID:
SA11861
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Stian Skjelstad has reported a vulnerability in the Linux kernel allowing malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel e1000 Network Driver Kernel Memory Disclosure
Vendor Patch. Secunia Advisory 19 of 29 in 2004. 16,160 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11626
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux kernel, potentially allowing malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel IO Bitmap Access Permissions Inheritance Vulnerability
Vendor Patch. Secunia Advisory 20 of 29 in 2004. 13,047 views.
Release Date:
2004-05-10
Secunia Advisory ID:
SA11577
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Stas Sergeev has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Framebuffer Driver Direct Userspace Access Vulnerability
Partial Fix. Secunia Advisory 21 of 29 in 2004. 16,072 views.
Release Date:
2004-04-28
Secunia Advisory ID:
SA11486
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Arjan van de Ven has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CPUFREQ Proc Handler Kernel Memory Disclosure Vulnerability
Vendor Patch. Secunia Advisory 22 of 29 in 2004. 20,189 views.
Release Date:
2004-04-23
Secunia Advisory ID:
SA11464
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Brad Spengler has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel setsockopt MCAST_MSFILTER Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 23 of 29 in 2004. 14,894 views.
Release Date:
2004-04-20
Secunia Advisory ID:
SA11429
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz and Wojciech Purczynski have reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ISO9660 Buffer Overflow Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 24 of 29 in 2004. 16,504 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11361
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
iDEFENSE has discovered a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel File Systems Information Leak and Denial of Service
Vendor Patch. Secunia Advisory 25 of 29 in 2004. 16,730 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11362
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have reportedly been fixed in the latest kernel releases. These may allow malicious, local users to cause a DoS (Denial of Service) or gain knowledge of sensitive information. [Read More]


Linux kernel ncpfs Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 26 of 29 in 2004. 19,042 views.
Release Date:
2004-02-19
Secunia Advisory ID:
SA10912
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Arjan van de Ven has discovered a vulnerability in the Linux kernel, allowing malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel Vicam USB Driver Insecure Userspace Access
Vendor Patch. Secunia Advisory 27 of 29 in 2004. 15,313 views.
Release Date:
2004-02-19
Secunia Advisory ID:
SA10911
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "mremap()" Missing Return Value Checking Privilege Escalation
Vendor Patch. Secunia Advisory 28 of 29 in 2004. 20,504 views.
Release Date:
2004-02-18
Secunia Advisory ID:
SA10897
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel "mremap()" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 29 of 29 in 2004. 24,218 views.
Release Date:
2004-01-05
Secunia Advisory ID:
SA10532
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz and Wojciech Purczynski have reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to escalate their privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Linux Kernel 2.6.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability