Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Linux Kernel 2.6.x

This vulnerability report for Linux Kernel 2.6.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Linux Kernel 2.6.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Kernel.org

Product Link View Here (Link to external site)

Affected By 337 Secunia advisories
693 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 7% (25 of 337 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Linux Kernel 2.6.x, with all vendor patches applied, is rated Moderately critical .




337 Secunia Advisories in 2003-2014

Secunia has issued a total of 337 Secunia advisories in 2003-2014 for Linux Kernel 2.6.x. Currently, 7% (25 out of 337) are marked as unpatched with the most severe being rated Moderately critical

More information about the specific Secunia advisories affecting Linux Kernel 2.6.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Linux Kernel "kvm_iommu_map_pages()" Mapping Failure Handling Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 1 of 22 in 2014. 445 views.
Release Date:
2014-08-28
Secunia Advisory ID:
SA60830
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). [Read More]


Linux Kernel NULL Pointer Dereference Vulnerabilities
Partial Fix. Secunia Advisory 2 of 22 in 2014. 261 views.
Release Date:
2014-08-06
Secunia Advisory ID:
SA60430
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sctp_association_free()" Integer Underflow Denial of Service Vulnerability
Partial Fix. Secunia Advisory 3 of 22 in 2014. 531 views.
Release Date:
2014-07-28
Secunia Advisory ID:
SA59128
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "lzo1x_decompress_safe()" Integer Overflow Vulnerability
Partial Fix. Secunia Advisory 4 of 22 in 2014. 319 views.
Release Date:
2014-07-22
Secunia Advisory ID:
SA59569
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel ALSA Multiple Vulnerabilities
Partial Fix. Secunia Advisory 5 of 22 in 2014. 1,487 views.
Release Date:
2014-07-22
Secunia Advisory ID:
SA59434
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Linux Kernel ptrace SYSRET Path Privilege Escalation Vulnerability
Partial Fix. Secunia Advisory 6 of 22 in 2014. 934 views.
Release Date:
2014-07-11
Secunia Advisory ID:
SA59633
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel System Call Auditing Denial of Service Vulnerability
Partial Fix. Secunia Advisory 7 of 22 in 2014. 835 views.
Release Date:
2014-07-09
Secunia Advisory ID:
SA58964
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "__do_follow_link()" Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 8 of 22 in 2014. 774 views.
Release Date:
2014-06-27
Secunia Advisory ID:
SA59560
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Inode Capabilities Privilege Escalation Vulnerability
Partial Fix. Secunia Advisory 9 of 22 in 2014. 565 views.
Release Date:
2014-06-16
Secunia Advisory ID:
SA59220
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Andy Lutomirski has reported a vulnerability in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Futex Requeue Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 10 of 22 in 2014. 1,309 views.
Release Date:
2014-06-06
Secunia Advisory ID:
SA59029
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel BPF Two Denial of Service Vulnerabilities
Partial Fix. Secunia Advisory 11 of 22 in 2014. 605 views.
Release Date:
2014-05-19
Secunia Advisory ID:
SA58569
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "n_tty_write()" Race Condition Vulnerability
Vendor Patch. Secunia Advisory 12 of 22 in 2014. 751 views.
Release Date:
2014-05-07
Secunia Advisory ID:
SA58082
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel "try_to_unmap_cluster()" Denial of Service Vulnerability
Partial Fix. Secunia Advisory 13 of 22 in 2014. 616 views.
Release Date:
2014-05-02
Secunia Advisory ID:
SA58091
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "rds_iw_laddr_check()" NULL Pointer Dereference Vulnerability
Vendor Patch. Secunia Advisory 14 of 22 in 2014. 667 views.
Release Date:
2014-04-07
Secunia Advisory ID:
SA57424
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel vhost-net Segmentation Memory Disclosure Security Issue
Partial Fix. Secunia Advisory 15 of 22 in 2014. 683 views.
Release Date:
2014-03-31
Secunia Advisory ID:
SA57543
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Where:
From local network
Short Description:
A security issue has been reported in Linux Kernel, which can be exploited by malicious people to potentially disclose sensitive information. [Read More]


Linux Kernel SCTP Handshake NULL Pointer Dereference Vulnerability
Vendor Patch. Secunia Advisory 16 of 22 in 2014. 1,497 views.
Release Date:
2014-03-21
Secunia Advisory ID:
SA57541
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "rds_ib_laddr_check()" NULL Pointer Dereference Vulnerability
Vendor Workaround. Secunia Advisory 17 of 22 in 2014. 790 views.
Release Date:
2014-03-21
Secunia Advisory ID:
SA57284
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel DCCP Packets Handling Memory Corruption Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 22 in 2014. 1,689 views.
Release Date:
2014-03-18
Secunia Advisory ID:
SA57446
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel Linkage Stack Instructions Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 19 of 22 in 2014. 1,300 views.
Release Date:
2014-02-21
Secunia Advisory ID:
SA56963
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIPSO Option Handling Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 20 of 22 in 2014. 606 views.
Release Date:
2014-02-20
Secunia Advisory ID:
SA56854
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "ieee80211_radiotap_iterator_init()" Denial of Service Vulnerability
Partial Fix. Secunia Advisory 21 of 22 in 2014. 752 views.
Release Date:
2014-01-14
Secunia Advisory ID:
SA56282
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "recvmsg()" and "recvfrom()" Information Disclosure Weaknesses
Partial Fix. Secunia Advisory 22 of 22 in 2014. 977 views.
Release Date:
2014-01-06
Secunia Advisory ID:
SA56036
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses have been reported in Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "get_wchan()" Stack Frame Unwinding Denial of Service Vulnerability
Partial Fix. Secunia Advisory 1 of 16 in 2013. 1,400 views.
Release Date:
2013-12-24
Secunia Advisory ID:
SA56224
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Konstantin Khlebnikov has reported a vulnerability in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel KVM Denial of Service and Memory Corruption Vulnerabilities
Partial Fix. Secunia Advisory 2 of 16 in 2013. 1,298 views.
Release Date:
2013-12-20
Secunia Advisory ID:
SA56115
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 3 of 16 in 2013. 1,649 views.
Release Date:
2013-12-04
Secunia Advisory ID:
SA55922
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel Radiotap Header Processing Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 4 of 16 in 2013. 1,744 views.
Release Date:
2013-11-29
Secunia Advisory ID:
SA55606
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "qeth_snmp_command()" Privilege Escalation Vulnerability
Partial Fix. Secunia Advisory 5 of 16 in 2013. 1,439 views.
Release Date:
2013-11-27
Secunia Advisory ID:
SA55642
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel IPVS Two Buffer Overflow Vulnerabilities
Vendor Workaround. Secunia Advisory 6 of 16 in 2013. 1,116 views.
Release Date:
2013-11-20
Secunia Advisory ID:
SA55709
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel AACRAID Driver Compat IOCTL Security Bypass Security Issue
Partial Fix. Secunia Advisory 7 of 16 in 2013. 2,622 views.
Release Date:
2013-11-04
Secunia Advisory ID:
SA55562
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel IPV4 and IPV6 UFO Packets Handling Memory Corruption Vulnerabilities
Vendor Workaround. Secunia Advisory 8 of 16 in 2013. 3,221 views.
Release Date:
2013-10-31
Secunia Advisory ID:
SA55348
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel IPV6 UFO Packets Handling Denial of Service Vulnerabilities
Partial Fix. Secunia Advisory 9 of 16 in 2013. 2,023 views.
Release Date:
2013-10-14
Secunia Advisory ID:
SA54767
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Ceph NULL Pointer Dereference Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 16 in 2013. 1,690 views.
Release Date:
2013-07-03
Secunia Advisory ID:
SA54042
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 16 in 2013. 1,307 views.
Release Date:
2013-06-19
Secunia Advisory ID:
SA53897
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service) and gain escalated privileges and by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 16 in 2013. 1,462 views.
Release Date:
2013-04-08
Secunia Advisory ID:
SA52868
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel "install_user_keyrings()" Race Condition Vulnerability
Vendor Patch. Secunia Advisory 13 of 16 in 2013. 2,372 views.
Release Date:
2013-03-07
Secunia Advisory ID:
SA52441
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "chase_port()" USB Unplugging Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 14 of 16 in 2013. 1,763 views.
Release Date:
2013-03-01
Secunia Advisory ID:
SA52343
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "xen_iret()" IRET Handling Vulnerability
Vendor Patch. Secunia Advisory 15 of 16 in 2013. 1,167 views.
Release Date:
2013-02-18
Secunia Advisory ID:
SA52270
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to gain escalated privileges. [Read More]


Linux Kernel ptrace Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 16 of 16 in 2013. 1,630 views.
Release Date:
2013-02-18
Secunia Advisory ID:
SA52269
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel HFS+ Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 1 of 13 in 2012. 1,326 views.
Release Date:
2012-10-09
Secunia Advisory ID:
SA50849
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel "madvise_remove()" Use-After-Free Vulnerability
Vendor Patch. Secunia Advisory 2 of 13 in 2012. 1,953 views.
Release Date:
2012-08-22
Secunia Advisory ID:
SA50310
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 13 in 2012. 1,925 views.
Release Date:
2012-08-21
Secunia Advisory ID:
SA50340
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. [Read More]


Linux Kernel Huge Pages Memory Leak Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 13 in 2012. 1,623 views.
Release Date:
2012-05-24
Secunia Advisory ID:
SA49191
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel mmap_sem Denial of Service Vulnerability
Unpatched. Secunia Advisory 5 of 13 in 2012. 1,594 views.
Release Date:
2012-05-21
Secunia Advisory ID:
SA49187
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NFSv4 Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 6 of 13 in 2012. 1,248 views.
Release Date:
2012-05-21
Secunia Advisory ID:
SA49149
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "__split_huge_page()" Race Condition Denial of Service Vulnerability
Unpatched. Secunia Advisory 7 of 13 in 2012. 2,017 views.
Release Date:
2012-03-16
Secunia Advisory ID:
SA48404
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc/<pid>/mem" Privilege Escalation Vulnerability
Vendor Workaround. Secunia Advisory 8 of 13 in 2012. 3,178 views.
Release Date:
2012-01-23
Secunia Advisory ID:
SA47378
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel KVM "syscall" Emulation and CIFS Special Files Lookup Denial of Service Vulnerabilities
Unpatched. Secunia Advisory 9 of 13 in 2012. 2,313 views.
Release Date:
2012-01-12
Secunia Advisory ID:
SA47482
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). [Read More]


Linux Kernel DRM "drm_mode_dirtyfb_ioctl()" Integer Overflow Vulnerability
Vendor Workaround. Secunia Advisory 10 of 13 in 2012. 1,892 views.
Release Date:
2012-01-11
Secunia Advisory ID:
SA47486
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "xfs_acl_from_disk()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 11 of 13 in 2012. 2,525 views.
Release Date:
2012-01-11
Secunia Advisory ID:
SA47488
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Linux Kernel "igmp_heard_query()" Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 12 of 13 in 2012. 2,558 views.
Release Date:
2012-01-10
Secunia Advisory ID:
SA47472
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel KVM KVM_ASSIGN_PCI_DEVICE IOCTL Denial of Service Vulnerability
Unpatched. Secunia Advisory 13 of 13 in 2012. 1,871 views.
Release Date:
2012-01-05
Secunia Advisory ID:
SA47431
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "SG_IO" SCSI IOCTL Privilege Escalation Vulnerability
Unpatched. Secunia Advisory 1 of 40 in 2011. 15,758 views.
Release Date:
2011-12-23
Secunia Advisory ID:
SA47296
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious, local users in a guest virtual machine to gain escalated privileges. [Read More]


Linux Kernel KVM PIT Denial of Service Vulnerability
Unpatched. Secunia Advisory 2 of 40 in 2011. 1,477 views.
Release Date:
2011-12-22
Secunia Advisory ID:
SA47293
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a guest virtual machine to cause a DoS (Denial of Service). [Read More]


Linux Kernel B.A.T.M.A.N. "bat_socket_read()" Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 3 of 40 in 2011. 4,614 views.
Release Date:
2011-12-13
Secunia Advisory ID:
SA47199
Solution Status:
Unpatched
Criticality:
Impact:
System access
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious people to compromise a vulnerable system. [Read More]


Linux Kernel Two Denial of Service Vulnerabilities
Vendor Workaround. Secunia Advisory 4 of 40 in 2011. 2,378 views.
Release Date:
2011-11-14
Secunia Advisory ID:
SA46803
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "journal_get_superblock()" Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 40 in 2011. 1,765 views.
Release Date:
2011-11-14
Secunia Advisory ID:
SA46802
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel XFS "xfs_readlink()" Buffer Overflow Vulnerability
Unpatched. Secunia Advisory 6 of 40 in 2011. 2,388 views.
Release Date:
2011-10-26
Secunia Advisory ID:
SA46591
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel ghash NULL Pointer Dereference Vulnerability
Vendor Workaround. Secunia Advisory 7 of 40 in 2011. 2,072 views.
Release Date:
2011-10-26
Secunia Advisory ID:
SA46584
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ext4 Extent Splitting Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 8 of 40 in 2011. 1,823 views.
Release Date:
2011-10-24
Secunia Advisory ID:
SA46489
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "apparmor_setprocattr()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 9 of 40 in 2011. 1,845 views.
Release Date:
2011-10-17
Secunia Advisory ID:
SA46423
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS DFS Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 40 in 2011. 2,184 views.
Release Date:
2011-09-15
Secunia Advisory ID:
SA45936
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "CIFSFindNext()" Signedness Error Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 11 of 40 in 2011. 2,616 views.
Release Date:
2011-08-24
Secunia Advisory ID:
SA45695
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Event Overflows Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 12 of 40 in 2011. 2,186 views.
Release Date:
2011-08-16
Secunia Advisory ID:
SA45533
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Two Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 40 in 2011. 3,097 views.
Release Date:
2011-08-12
Secunia Advisory ID:
SA45489
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 40 in 2011. 3,051 views.
Release Date:
2011-07-29
Secunia Advisory ID:
SA45420
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS and potentially gain escalated privileges and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Xtensa "ptrace_setxregs()" Memory Disclosure Weakness
Vendor Patch. Secunia Advisory 15 of 40 in 2011. 2,210 views.
Release Date:
2011-07-27
Secunia Advisory ID:
SA45267
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel GFS2 / ext4 Denial of Service Vulnerabilities
Vendor Workaround. Secunia Advisory 16 of 40 in 2011. 3,326 views.
Release Date:
2011-07-14
Secunia Advisory ID:
SA45193
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Transparent Hugepage Support Denial of Service Weakness
Vendor Patch. Secunia Advisory 17 of 40 in 2011. 2,313 views.
Release Date:
2011-06-21
Secunia Advisory ID:
SA44986
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 18 of 40 in 2011. 3,879 views.
Release Date:
2011-06-03
Secunia Advisory ID:
SA44754
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), and gain escalated privileges and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel "key_replace_session_keyring()" NULL Pointer Dereference Denial of Service
Vendor Patch. Secunia Advisory 19 of 40 in 2011. 2,783 views.
Release Date:
2011-05-31
Secunia Advisory ID:
SA44747
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 40 in 2011. 3,134 views.
Release Date:
2011-05-19
Secunia Advisory ID:
SA44625
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Bluetooth Memory Leak Weaknesses
Vendor Workaround. Secunia Advisory 21 of 40 in 2011. 2,282 views.
Release Date:
2011-05-11
Secunia Advisory ID:
SA44466
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 40 in 2011. 3,242 views.
Release Date:
2011-04-22
Secunia Advisory ID:
SA44248
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 40 in 2011. 3,159 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44164
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NULL Pointer Dereference Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 40 in 2011. 2,455 views.
Release Date:
2011-04-20
Secunia Advisory ID:
SA44220
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "mremap()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 25 of 40 in 2011. 2,219 views.
Release Date:
2011-04-12
Secunia Advisory ID:
SA44094
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "inotify_init1()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 26 of 40 in 2011. 2,500 views.
Release Date:
2011-04-11
Secunia Advisory ID:
SA44091
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel OCFS2 Sparse Writes Information Disclosure Weakness
Vendor Patch. Secunia Advisory 27 of 40 in 2011. 2,784 views.
Release Date:
2011-03-31
Secunia Advisory ID:
SA43966
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "iriap_getvaluebyclass_indication()" Buffer Overflows
Unpatched. Secunia Advisory 28 of 40 in 2011. 2,314 views.
Release Date:
2011-03-25
Secunia Advisory ID:
SA43841
Solution Status:
Unpatched
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 40 in 2011. 3,169 views.
Release Date:
2011-03-22
Secunia Advisory ID:
SA43846
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Weaknesses
Vendor Patch. Secunia Advisory 30 of 40 in 2011. 3,212 views.
Release Date:
2011-03-21
Secunia Advisory ID:
SA43806
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information and bypass certain security restrictions. [Read More]


Linux Kernel TPM Information Disclosure Weaknesses
Partial Fix. Secunia Advisory 31 of 40 in 2011. 2,737 views.
Release Date:
2011-03-14
Secunia Advisory ID:
SA43576
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "ldm_frag_add()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 32 of 40 in 2011. 2,604 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43716
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people with physical access to potentially compromise a vulnerable system. [Read More]


Linux Kernel InfiniBand Request Handling Denial of Service
Unpatched. Secunia Advisory 33 of 40 in 2011. 3,411 views.
Release Date:
2011-03-11
Secunia Advisory ID:
SA43693
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 34 of 40 in 2011. 3,540 views.
Release Date:
2011-03-04
Secunia Advisory ID:
SA43594
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel epoll Denial of Service Vulnerability
Unpatched. Secunia Advisory 35 of 40 in 2011. 3,263 views.
Release Date:
2011-03-02
Secunia Advisory ID:
SA43522
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 36 of 40 in 2011. 2,709 views.
Release Date:
2011-03-01
Secunia Advisory ID:
SA43537
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
DoS
Where:
Local system
Short Description:
Vasiliy Kulikov has reported a weakness and some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to disclose system information or cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc/<pid>/" Permissions Handling Weakness
Unpatched. Secunia Advisory 37 of 40 in 2011. 3,947 views.
Release Date:
2011-02-25
Secunia Advisory ID:
SA43496
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
halfdog has discovered a weakness in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel World-Writable sysfs and procfs Files Weaknesses
Partial Fix. Secunia Advisory 38 of 40 in 2011. 2,782 views.
Release Date:
2011-02-22
Secunia Advisory ID:
SA43405
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "xfs_fs_geometry()" Memory Disclosure Weakness
Vendor Patch. Secunia Advisory 39 of 40 in 2011. 2,290 views.
Release Date:
2011-02-16
Secunia Advisory ID:
SA43358
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 40 in 2011. 4,797 views.
Release Date:
2011-01-25
Secunia Advisory ID:
SA43009
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Privilege escalation
DoS
System access
Where:
Local system
Short Description:
Some weaknesses and vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information, bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people with physical access to potentially compromise a vulnerable system and cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 47 in 2010. 3,377 views.
Release Date:
2010-12-31
Secunia Advisory ID:
SA42765
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel "irda_getsockopt()" Integer Underflow Weakness
Vendor Patch. Secunia Advisory 2 of 47 in 2010. 3,265 views.
Release Date:
2010-12-23
Secunia Advisory ID:
SA42684
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Dan Rosenberg has reported a weakness in the Linux Kernel, which can be exploited by malicious, local users to disclose system information. [Read More]


Linux Kernel "install_special_mapping()" mmap_min_addr Security Bypass Weakness
Vendor Patch. Secunia Advisory 3 of 47 in 2010. 3,240 views.
Release Date:
2010-12-10
Secunia Advisory ID:
SA42570
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Socket Denial of Service Vulnerability
Unpatched. Secunia Advisory 4 of 47 in 2010. 3,261 views.
Release Date:
2010-11-24
Secunia Advisory ID:
SA42354
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel inotify Memory Leak Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 47 in 2010. 2,895 views.
Release Date:
2010-11-24
Secunia Advisory ID:
SA42365
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vegard Nossum has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 47 in 2010. 3,513 views.
Release Date:
2010-11-12
Secunia Advisory ID:
SA42172
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Socket Filter Memory Leak Weakness
Vendor Patch. Secunia Advisory 7 of 47 in 2010. 3,460 views.
Release Date:
2010-11-11
Secunia Advisory ID:
SA42187
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Dan Rosenberg has reported a weakness in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 8 of 47 in 2010. 3,015 views.
Release Date:
2010-11-11
Secunia Advisory ID:
SA42176
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses and vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information and cause a DoS (Denial of Service). [Read More]


Linux Kernel KVM Two Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 47 in 2010. 3,226 views.
Release Date:
2010-11-05
Secunia Advisory ID:
SA42148
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information and cause a DoS (Denial of Service). [Read More]


Linux Kernel INET Socket Monitoring Bytecode Security Bypass
Vendor Patch. Secunia Advisory 10 of 47 in 2010. 3,959 views.
Release Date:
2010-11-05
Secunia Advisory ID:
SA42126
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "x25_parse_facilities()" Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 47 in 2010. 2,800 views.
Release Date:
2010-11-04
Secunia Advisory ID:
SA42094
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Exposure of system information
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 12 of 47 in 2010. 3,420 views.
Release Date:
2010-11-04
Secunia Advisory ID:
SA42035
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose system information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak Weaknesses
Vendor Patch. Secunia Advisory 13 of 47 in 2010. 3,730 views.
Release Date:
2010-11-03
Secunia Advisory ID:
SA42061
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Denial of Service and Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 47 in 2010. 3,405 views.
Release Date:
2010-10-14
Secunia Advisory ID:
SA41693
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel "snd_ctl_new()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 15 of 47 in 2010. 3,794 views.
Release Date:
2010-09-29
Secunia Advisory ID:
SA41650
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 16 of 47 in 2010. 3,667 views.
Release Date:
2010-09-22
Secunia Advisory ID:
SA41493
Solution Status:
Vendor Patch
Criticality:
Impact:
Hijacking
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), conduct session hijacking attacks, or disclose sensitive information. [Read More]


Linux Kernel Privilege Escalation Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 47 in 2010. 5,240 views.
Release Date:
2010-09-15
Secunia Advisory ID:
SA41462
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ben Hawkes has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Memory Leak Weaknesses
Partial Fix. Secunia Advisory 18 of 47 in 2010. 4,752 views.
Release Date:
2010-09-15
Secunia Advisory ID:
SA41440
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
Some weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel "niu_get_ethtool_tcam_all()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 19 of 47 in 2010. 3,361 views.
Release Date:
2010-09-09
Secunia Advisory ID:
SA41378
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak and Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 20 of 47 in 2010. 4,424 views.
Release Date:
2010-09-08
Secunia Advisory ID:
SA41284
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system and potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 21 of 47 in 2010. 4,149 views.
Release Date:
2010-09-02
Secunia Advisory ID:
SA41263
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Exposure of sensitive information
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, and potentially gain escalated privileges. [Read More]


Linux Kernel "irda_bind()" Object Cleanup Vulnerability
Vendor Patch. Secunia Advisory 22 of 47 in 2010. 3,631 views.
Release Date:
2010-09-01
Secunia Advisory ID:
SA41234
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Memory Leak Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 47 in 2010. 4,508 views.
Release Date:
2010-08-31
Secunia Advisory ID:
SA41245
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Some weaknesses and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel CAN Broadcast Manager Integer Overflow Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 47 in 2010. 3,351 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA41055
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel DRM Kernel Memory Disclosure Vulnerability
Vendor Patch. Secunia Advisory 25 of 47 in 2010. 3,375 views.
Release Date:
2010-08-20
Secunia Advisory ID:
SA40656
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel 64bit Maximum Stack Size Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 26 of 47 in 2010. 3,820 views.
Release Date:
2010-08-17
Secunia Advisory ID:
SA41002
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Brad Spengler has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 27 of 47 in 2010. 4,480 views.
Release Date:
2010-08-17
Secunia Advisory ID:
SA40965
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges. [Read More]


Linux Kernel CIFS DNS Lookup Keyring Cache Poisoning Vulnerability
Vendor Patch. Secunia Advisory 28 of 47 in 2010. 3,984 views.
Release Date:
2010-07-23
Secunia Advisory ID:
SA40691
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Spoofing
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to conduct DNS cache poisoning attacks. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 29 of 47 in 2010. 3,916 views.
Release Date:
2010-06-18
Secunia Advisory ID:
SA40205
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Two weaknesses, a security issue, and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and potentially gain escalated privileges and by malicious people to disclose potentially sensitive information. [Read More]


Linux Kernel Ext4 Security Bypass Vulnerabilities
Vendor Patch. Secunia Advisory 30 of 47 in 2010. 4,122 views.
Release Date:
2010-05-31
Secunia Advisory ID:
SA39982
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 31 of 47 in 2010. 4,766 views.
Release Date:
2010-04-19
Secunia Advisory ID:
SA39490
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ReiserFS ".reiserfs_priv" Security Bypass
Vendor Patch. Secunia Advisory 32 of 47 in 2010. 3,767 views.
Release Date:
2010-04-09
Secunia Advisory ID:
SA39316
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "cifs_create()" NULL Pointer Dereference
Unpatched. Secunia Advisory 33 of 47 in 2010. 3,147 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39344
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel r128 NULL Pointer Dereference Vulnerability
Vendor Patch. Secunia Advisory 34 of 47 in 2010. 2,455 views.
Release Date:
2010-04-05
Secunia Advisory ID:
SA39297
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Two Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 35 of 47 in 2010. 4,335 views.
Release Date:
2010-03-26
Secunia Advisory ID:
SA39080
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users or by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Video Output Status Denial of Service
Vendor Patch. Secunia Advisory 36 of 47 in 2010. 3,088 views.
Release Date:
2010-03-09
Secunia Advisory ID:
SA38863
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel hda-intel Driver "azx_position_ok()" Denial of Service
Vendor Patch. Secunia Advisory 37 of 47 in 2010. 4,138 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38718
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 38 of 47 in 2010. 3,827 views.
Release Date:
2010-02-22
Secunia Advisory ID:
SA38594
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges and by malicious people to cause a DoS. [Read More]


Linux Kernel USB Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 39 of 47 in 2010. 3,992 views.
Release Date:
2010-02-17
Secunia Advisory ID:
SA38601
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
A weakness and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 40 of 47 in 2010. 4,541 views.
Release Date:
2010-02-09
Secunia Advisory ID:
SA38499
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users in a KVM guest and malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 41 of 47 in 2010. 5,043 views.
Release Date:
2010-02-08
Secunia Advisory ID:
SA38502
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and potentially gain escalated privileges. [Read More]


Linux Kernel KVM "pit_ioport_read()" Denial of Service
Vendor Patch. Secunia Advisory 42 of 47 in 2010. 3,604 views.
Release Date:
2010-02-04
Secunia Advisory ID:
SA38405
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users in a KVM guest to cause a DoS (Denial of Service). [Read More]


Linux Kernel connector Denial of Service Security Issue
Vendor Patch. Secunia Advisory 43 of 47 in 2010. 3,412 views.
Release Date:
2010-02-03
Secunia Advisory ID:
SA38317
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel 64bit Personality Handling Denial of Service
Vendor Patch. Secunia Advisory 44 of 47 in 2010. 3,942 views.
Release Date:
2010-02-01
Secunia Advisory ID:
SA38354
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "do_mremap()" Vulnerabilities
Vendor Patch. Secunia Advisory 45 of 47 in 2010. 2,664 views.
Release Date:
2010-01-20
Secunia Advisory ID:
SA38229
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel FASYNC Use-After-Free Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 46 of 47 in 2010. 7,274 views.
Release Date:
2010-01-14
Secunia Advisory ID:
SA38199
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ebtables Security Bypass
Vendor Patch. Secunia Advisory 47 of 47 in 2010. 4,231 views.
Release Date:
2010-01-13
Secunia Advisory ID:
SA38133
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Ext4 Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 38 in 2009. 6,975 views.
Release Date:
2009-12-10
Secunia Advisory ID:
SA37658
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 2 of 38 in 2009. 6,302 views.
Release Date:
2009-12-04
Secunia Advisory ID:
SA37590
Solution Status:
Partial Fix
Criticality:
Impact:
Manipulation of data
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to manipulate certain data and cause a DoS (Denial of Service), and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel "gdth_read_event()" Array Indexing Vulnerability
Vendor Patch. Secunia Advisory 3 of 38 in 2009. 5,094 views.
Release Date:
2009-11-19
Secunia Advisory ID:
SA37435
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 38 in 2009. 4,727 views.
Release Date:
2009-11-17
Secunia Advisory ID:
SA37357
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 38 in 2009. 4,928 views.
Release Date:
2009-11-04
Secunia Advisory ID:
SA37233
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel connector Security Bypass
Vendor Patch. Secunia Advisory 6 of 38 in 2009. 3,953 views.
Release Date:
2009-10-27
Secunia Advisory ID:
SA37113
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 38 in 2009. 5,878 views.
Release Date:
2009-10-19
Secunia Advisory ID:
SA37086
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, cause a DoS (Denial of Service), and potentially gain escalated privileges. [Read More]


Linux Kernel 64bit Kernel Register Value Leak
Vendor Patch. Secunia Advisory 8 of 38 in 2009. 4,664 views.
Release Date:
2009-10-02
Secunia Advisory ID:
SA36927
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose certain system information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 38 in 2009. 4,080 views.
Release Date:
2009-09-17
Secunia Advisory ID:
SA36763
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), and gain escalated privileges and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 38 in 2009. 6,913 views.
Release Date:
2009-09-14
Secunia Advisory ID:
SA36707
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel Two Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 38 in 2009. 3,537 views.
Release Date:
2009-09-08
Secunia Advisory ID:
SA36617
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service). [Read More]


Linux Kernel ".getname" Information Disclosure
Vendor Patch. Secunia Advisory 12 of 38 in 2009. 4,653 views.
Release Date:
2009-08-27
Secunia Advisory ID:
SA36438
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 38 in 2009. 5,921 views.
Release Date:
2009-08-14
Secunia Advisory ID:
SA36278
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges, and by malicious people to cause a DoS. [Read More]


Linux Kernel "mm_for_maps()" Information Disclosure
Vendor Patch. Secunia Advisory 14 of 38 in 2009. 2,984 views.
Release Date:
2009-08-11
Secunia Advisory ID:
SA36265
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "clock_nanosleep()" NULL Pointer Dereference
Vendor Patch. Secunia Advisory 15 of 38 in 2009. 4,193 views.
Release Date:
2009-08-07
Secunia Advisory ID:
SA36200
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "sigaltstack()" Information Disclosure
Vendor Patch. Secunia Advisory 16 of 38 in 2009. 4,064 views.
Release Date:
2009-08-04
Secunia Advisory ID:
SA36136
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel "clear_child_tid" Memory Corruption
Vendor Patch. Secunia Advisory 17 of 38 in 2009. 5,003 views.
Release Date:
2009-08-04
Secunia Advisory ID:
SA35983
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel eCryptfs Two Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 38 in 2009. 5,229 views.
Release Date:
2009-07-29
Secunia Advisory ID:
SA35985
Solution Status:
Vendor Patch
Criticality:
Impact:
System access
Where:
From remote
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to potentially compromise a user's system. [Read More]


Linux Kernel "tun_char_poll()" NULL Pointer Dereference
Vendor Patch. Secunia Advisory 19 of 38 in 2009. 5,139 views.
Release Date:
2009-07-17
Secunia Advisory ID:
SA35839
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel "PER_CLEAR_ON_SETID" Security Issue
Vendor Patch. Secunia Advisory 20 of 38 in 2009. 5,840 views.
Release Date:
2009-07-13
Secunia Advisory ID:
SA35801
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel KVM and Route Flushing Denial of Service
Vendor Patch. Secunia Advisory 21 of 38 in 2009. 3,152 views.
Release Date:
2009-07-06
Secunia Advisory ID:
SA35705
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel e1000 / e1000e / RTL8169 Drivers Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 38 in 2009. 13,058 views.
Release Date:
2009-06-03
Secunia Advisory ID:
SA35265
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Security Issues
Vendor Patch. Secunia Advisory 23 of 38 in 2009. 4,380 views.
Release Date:
2009-05-18
Secunia Advisory ID:
SA35127
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NFSv4 "MAY_EXEC" Security Bypass
Vendor Patch. Secunia Advisory 24 of 38 in 2009. 4,983 views.
Release Date:
2009-05-15
Secunia Advisory ID:
SA35106
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel CIFS String Conversion Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 38 in 2009. 5,327 views.
Release Date:
2009-05-15
Secunia Advisory ID:
SA35107
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious users and malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel "ptrace_attach()" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 26 of 38 in 2009. 6,280 views.
Release Date:
2009-05-04
Secunia Advisory ID:
SA34977
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 27 of 38 in 2009. 5,609 views.
Release Date:
2009-04-08
Secunia Advisory ID:
SA34644
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
System access
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and bypass certain security restrictions, and by malicious people to potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Security Issues
Vendor Patch. Secunia Advisory 28 of 38 in 2009. 5,016 views.
Release Date:
2009-04-08
Secunia Advisory ID:
SA34614
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and disclose potentially sensitive information. [Read More]


Linux Kernel Denial of Service Security Issues and Vulnerability
Vendor Patch. Secunia Advisory 29 of 38 in 2009. 5,050 views.
Release Date:
2009-04-03
Secunia Advisory ID:
SA34478
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Three security issues and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


Linux Kernel Information Disclosure and Security Bypass
Vendor Patch. Secunia Advisory 30 of 38 in 2009. 6,436 views.
Release Date:
2009-03-23
Secunia Advisory ID:
SA34422
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of system information
Exposure of sensitive information
Where:
From local network
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and by malicious users to bypass certain security restrictions. [Read More]


Linux Kernel 32bit/64bit System Call Security Bypass Weaknesses
Vendor Patch. Secunia Advisory 31 of 38 in 2009. 7,085 views.
Release Date:
2009-03-03
Secunia Advisory ID:
SA34084
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Two weaknesses have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel "clone()" Child Signal Sending Weakness
Vendor Patch. Secunia Advisory 32 of 38 in 2009. 5,401 views.
Release Date:
2009-02-25
Secunia Advisory ID:
SA34033
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A weakness has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 33 of 38 in 2009. 4,717 views.
Release Date:
2009-02-24
Secunia Advisory ID:
SA33977
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 34 of 38 in 2009. 6,082 views.
Release Date:
2009-02-20
Secunia Advisory ID:
SA33938
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
A weakness and two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, cause a DoS (Denial of Service), or potentially gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 35 of 38 in 2009. 5,081 views.
Release Date:
2009-02-04
Secunia Advisory ID:
SA33785
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel dell_rbu Denial of Service Security Issues
Vendor Patch. Secunia Advisory 36 of 38 in 2009. 7,752 views.
Release Date:
2009-01-26
Secunia Advisory ID:
SA33656
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "keyctl_join_session_keyring()" Denial of Service
Vendor Patch. Secunia Advisory 37 of 38 in 2009. 7,529 views.
Release Date:
2009-01-19
Secunia Advisory ID:
SA33569
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel 64bit ABI System Call Parameter Sign Extension Security Issue
Vendor Patch. Secunia Advisory 38 of 38 in 2009. 8,063 views.
Release Date:
2009-01-14
Secunia Advisory ID:
SA33477
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to potentially cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel MIPS Syscall Denial of Service
Vendor Patch. Secunia Advisory 1 of 23 in 2008. 6,449 views.
Release Date:
2008-12-09
Secunia Advisory ID:
SA33078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 23 in 2008. 6,049 views.
Release Date:
2008-12-04
Secunia Advisory ID:
SA32933
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 23 in 2008. 9,548 views.
Release Date:
2008-11-28
Secunia Advisory ID:
SA32913
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "hfs_cat_find_brec()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 23 in 2008. 8,201 views.
Release Date:
2008-11-14
Secunia Advisory ID:
SA32719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 23 in 2008. 9,177 views.
Release Date:
2008-11-04
Secunia Advisory ID:
SA32510
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), and by malicious people to potentially cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 6 of 23 in 2008. 6,776 views.
Release Date:
2008-10-20
Secunia Advisory ID:
SA32320
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A weakness, a security issue, and a vulnerability have been reported in the Linux kernel, which can be exploited by malicious, local users to bypass certain security restrictions and potentially gain escalated privileges. [Read More]


Linux Kernel "vmi_write_ldt_entry()" Privilege Escalation
Vendor Workaround. Secunia Advisory 7 of 23 in 2008. 7,967 views.
Release Date:
2008-10-03
Secunia Advisory ID:
SA32124
Solution Status:
Vendor Workaround
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Eugene Teo has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users in a VMI guest to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel s390 ptrace Local Denial of Service
Vendor Workaround. Secunia Advisory 8 of 23 in 2008. 5,025 views.
Release Date:
2008-09-15
Secunia Advisory ID:
SA31826
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "rt6_fill_node()" Denial of Service Vulnerability
Vendor Workaround. Secunia Advisory 9 of 23 in 2008. 7,518 views.
Release Date:
2008-08-22
Secunia Advisory ID:
SA31579
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "dccp_setsockopt_change()" Integer Overflow
Vendor Patch. Secunia Advisory 10 of 23 in 2008. 9,089 views.
Release Date:
2008-08-18
Secunia Advisory ID:
SA31509
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 11 of 23 in 2008. 9,724 views.
Release Date:
2008-08-06
Secunia Advisory ID:
SA31366
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or to cause a DoS (Denial of Service). [Read More]


Linux Kernel LDT Buffer Size Handling Vulnerability
Vendor Patch. Secunia Advisory 12 of 23 in 2008. 8,735 views.
Release Date:
2008-07-24
Secunia Advisory ID:
SA31172
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and potentially gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 23 in 2008. 12,911 views.
Release Date:
2008-07-11
Secunia Advisory ID:
SA31048
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 23 in 2008. 10,388 views.
Release Date:
2008-06-16
Secunia Advisory ID:
SA30719
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ASN.1 BER Decoding Vulnerability
Vendor Patch. Secunia Advisory 15 of 23 in 2008. 13,836 views.
Release Date:
2008-06-09
Secunia Advisory ID:
SA30580
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel SPARC Address Limit Denial of Service
Vendor Patch. Secunia Advisory 16 of 23 in 2008. 9,556 views.
Release Date:
2008-05-27
Secunia Advisory ID:
SA30258
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 23 in 2008. 13,583 views.
Release Date:
2008-05-15
Secunia Advisory ID:
SA30241
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to bypass certain security restrictions or cause a DoS (Denial of service), and by malicious people to potentially cause a DoS. [Read More]


Linux Kernel "fcntl_setlk()" SMP Reordered Access Vulnerability
Vendor Patch. Secunia Advisory 18 of 23 in 2008. 10,319 views.
Release Date:
2008-05-07
Secunia Advisory ID:
SA30101
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 19 of 23 in 2008. 14,951 views.
Release Date:
2008-05-02
Secunia Advisory ID:
SA30044
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS or to potentially gain escalated privileges. [Read More]


Linux Kernel "vmsplice()" System Call Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 23 in 2008. 31,707 views.
Release Date:
2008-02-11
Secunia Advisory ID:
SA28835
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and gain escalated privileges. [Read More]


Linux Kernel Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 21 of 23 in 2008. 15,371 views.
Release Date:
2008-02-01
Secunia Advisory ID:
SA28696
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A security issue and two vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel minix File System Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 22 of 23 in 2008. 11,276 views.
Release Date:
2008-01-28
Secunia Advisory ID:
SA28654
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Directory Truncation Vulnerability
Vendor Patch. Secunia Advisory 23 of 23 in 2008. 14,934 views.
Release Date:
2008-01-15
Secunia Advisory ID:
SA28485
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Manipulation of data
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and corrupt a file system. [Read More]


Linux Kernel "hrtimer_start()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 32 in 2007. 13,154 views.
Release Date:
2007-12-17
Secunia Advisory ID:
SA28105
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with an unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel "mmap_min_addr" Security Bypass
Vendor Workaround. Secunia Advisory 2 of 32 in 2007. 13,504 views.
Release Date:
2007-12-12
Secunia Advisory ID:
SA28070
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 32 in 2007. 15,534 views.
Release Date:
2007-12-05
Secunia Advisory ID:
SA27908
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or gain escalated privileges. [Read More]


Linux Kernel "isdn_net_setcfg()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 32 in 2007. 15,692 views.
Release Date:
2007-11-30
Secunia Advisory ID:
SA27842
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 32 in 2007. 16,004 views.
Release Date:
2007-11-19
Secunia Advisory ID:
SA27664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS "SendReceive()" Buffer Overflow
Vendor Workaround. Secunia Advisory 6 of 32 in 2007. 15,121 views.
Release Date:
2007-11-14
Secunia Advisory ID:
SA27666
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 32 in 2007. 14,411 views.
Release Date:
2007-11-08
Secunia Advisory ID:
SA27555
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users or by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ALSA "snd_mem_proc_read()" Information Disclosure
Vendor Patch. Secunia Advisory 8 of 32 in 2007. 12,721 views.
Release Date:
2007-09-26
Secunia Advisory ID:
SA26918
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel ptrace Single Step "CS" Null Pointer Dereference
Vendor Workaround. Secunia Advisory 9 of 32 in 2007. 12,714 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26935
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Evan Teran has reported a security issue in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ptrace Local Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 10 of 32 in 2007. 15,841 views.
Release Date:
2007-09-24
Secunia Advisory ID:
SA26934
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Wojciech Purczynski has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 11 of 32 in 2007. 14,582 views.
Release Date:
2007-08-10
Secunia Advisory ID:
SA26389
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel CIFS Signing Options Weakness
Vendor Workaround. Secunia Advisory 12 of 32 in 2007. 14,110 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26366
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel AACRAID Driver IOCTL Security Bypass
Vendor Patch. Secunia Advisory 13 of 32 in 2007. 16,539 views.
Release Date:
2007-08-06
Secunia Advisory ID:
SA26322
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Security Bypass and Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 32 in 2007. 15,570 views.
Release Date:
2007-07-09
Secunia Advisory ID:
SA25955
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and cause a DoS (Denial of Service), and malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Security Issues
Vendor Patch. Secunia Advisory 15 of 32 in 2007. 14,938 views.
Release Date:
2007-07-02
Secunia Advisory ID:
SA25895
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, to gain escalated privileges, or to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sysfs_readdir()" Denial of Service
Vendor Patch. Secunia Advisory 16 of 32 in 2007. 12,132 views.
Release Date:
2007-06-26
Secunia Advisory ID:
SA25771
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a Denial of Service (DoS). [Read More]


Linux Kernel "compat_sys_mount()" Denial of Service Security Issue
Vendor Patch. Secunia Advisory 17 of 32 in 2007. 12,996 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25682
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 32 in 2007. 17,851 views.
Release Date:
2007-06-08
Secunia Advisory ID:
SA25594
Solution Status:
Vendor Patch
Criticality:
Impact:
Brute force
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel VFAT IOCTLs and IPv6 Jumbogram Denial of Service
Vendor Patch. Secunia Advisory 19 of 32 in 2007. 13,110 views.
Release Date:
2007-06-01
Secunia Advisory ID:
SA25505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel GEODE-AES Encryption Security Issue
Vendor Patch. Secunia Advisory 20 of 32 in 2007. 13,524 views.
Release Date:
2007-05-25
Secunia Advisory ID:
SA25398
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Brute force
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 21 of 32 in 2007. 14,506 views.
Release Date:
2007-05-08
Secunia Advisory ID:
SA25163
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel netlink NETLINK_FIB_LOOKUP Denial of Service
Vendor Patch. Secunia Advisory 22 of 32 in 2007. 11,600 views.
Release Date:
2007-05-01
Secunia Advisory ID:
SA25030
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IPv6 Type 0 Route Headers and RTA_MAX Denial of Service
Vendor Patch. Secunia Advisory 23 of 32 in 2007. 16,220 views.
Release Date:
2007-04-30
Secunia Advisory ID:
SA25068
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability and a security issue have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "atalk_sum_skb()" AppleTalk Denial of Service
Vendor Patch. Secunia Advisory 24 of 32 in 2007. 12,215 views.
Release Date:
2007-04-10
Secunia Advisory ID:
SA24793
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 32 in 2007. 17,778 views.
Release Date:
2007-03-23
Secunia Advisory ID:
SA24618
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NULL Pointer Dereferences and Security Bypass
Vendor Patch. Secunia Advisory 26 of 32 in 2007. 17,240 views.
Release Date:
2007-03-14
Secunia Advisory ID:
SA24492
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Linux Kernel "ipv6_getsockopt_sticky()" DoS and Information Leak
Vendor Patch. Secunia Advisory 27 of 32 in 2007. 14,964 views.
Release Date:
2007-03-12
Secunia Advisory ID:
SA24493
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel Omnikey CardMan 4040 Driver Buffer Overflow
Vendor Patch. Secunia Advisory 28 of 32 in 2007. 16,065 views.
Release Date:
2007-03-08
Secunia Advisory ID:
SA24436
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel NFSACL "ACCESS" Denial of Service
Vendor Patch. Secunia Advisory 29 of 32 in 2007. 14,918 views.
Release Date:
2007-02-20
Secunia Advisory ID:
SA24215
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "key_alloc_serial()" Denial of Service
Vendor Patch. Secunia Advisory 30 of 32 in 2007. 13,138 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24109
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "listxattr" Memory Corruption and Denial of Service
Vendor Patch. Secunia Advisory 31 of 32 in 2007. 16,435 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23955
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Local Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 32 of 32 in 2007. 13,488 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "do_coredump()" File Overwrite Vulnerability
Vendor Patch. Secunia Advisory 1 of 44 in 2006. 14,053 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23349
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to overwrite arbitrary files. [Read More]


Linux Kernel Bluetooth CAPI Messages Denial of Service
Vendor Patch. Secunia Advisory 2 of 44 in 2006. 15,968 views.
Release Date:
2006-12-18
Secunia Advisory ID:
SA23427
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Various Vulnerabilities
Partial Fix. Secunia Advisory 3 of 44 in 2006. 18,507 views.
Release Date:
2006-12-14
Secunia Advisory ID:
SA23361
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported within the Linux kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "ip_summed" Memory Corruption Vulnerability
Vendor Workaround. Secunia Advisory 4 of 44 in 2006. 13,987 views.
Release Date:
2006-12-08
Secunia Advisory ID:
SA23254
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 44 in 2006. 15,146 views.
Release Date:
2006-11-30
Secunia Advisory ID:
SA23073
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, or to potentially gain escalated privileges. [Read More]


Linux Kernel Fragmented IPv6 Packet Filtering Bypass
Vendor Workaround. Secunia Advisory 6 of 44 in 2006. 16,637 views.
Release Date:
2006-11-07
Secunia Advisory ID:
SA22731
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel ISO9660 Local Denial of Service
Vendor Workaround. Secunia Advisory 7 of 44 in 2006. 16,333 views.
Release Date:
2006-11-06
Secunia Advisory ID:
SA22702
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
LMH has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IPv6 Flow Label Denial of Service
Vendor Patch. Secunia Advisory 8 of 44 in 2006. 14,678 views.
Release Date:
2006-11-01
Secunia Advisory ID:
SA22665
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 44 in 2006. 13,805 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22279
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel s390 "copy_from_user" Information Disclosure
Vendor Patch. Secunia Advisory 10 of 44 in 2006. 13,575 views.
Release Date:
2006-10-06
Secunia Advisory ID:
SA22289
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. [Read More]


Linux Kernel SCTP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 11 of 44 in 2006. 14,068 views.
Release Date:
2006-09-19
Secunia Advisory ID:
SA21945
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ELF Cross-Region Mapping Denial of Service
Vendor Patch. Secunia Advisory 12 of 44 in 2006. 14,715 views.
Release Date:
2006-09-18
Secunia Advisory ID:
SA21999
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ULE Packet Handling Denial of Service
Vendor Patch. Secunia Advisory 13 of 44 in 2006. 15,198 views.
Release Date:
2006-09-11
Secunia Advisory ID:
SA21820
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Ang Way Chuang has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Uncleared HID0[31] Denial of Service
Vendor Patch. Secunia Advisory 14 of 44 in 2006. 13,407 views.
Release Date:
2006-08-21
Secunia Advisory ID:
SA21563
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 15 of 44 in 2006. 15,879 views.
Release Date:
2006-08-17
Secunia Advisory ID:
SA21515
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Ext3 Invalid Inode Number Denial of Service
Vendor Workaround. Secunia Advisory 16 of 44 in 2006. 16,952 views.
Release Date:
2006-08-07
Secunia Advisory ID:
SA21369
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
James McKenzie has reported a vulnerability in Linux Kernel, which can be exploited by malicious users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "/proc" Race Condition Privilege Escalation
Vendor Patch. Secunia Advisory 17 of 44 in 2006. 18,732 views.
Release Date:
2006-07-17
Secunia Advisory ID:
SA21041
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel "prctl" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 18 of 44 in 2006. 19,485 views.
Release Date:
2006-07-07
Secunia Advisory ID:
SA20953
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions or potentially gain escalated privileges. [Read More]


Linux Kernel SCTP Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 19 of 44 in 2006. 14,437 views.
Release Date:
2006-07-03
Secunia Advisory ID:
SA20917
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 20 of 44 in 2006. 15,852 views.
Release Date:
2006-06-20
Secunia Advisory ID:
SA20703
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and cause a DoS (Denial of Service), and by malicious people to cause a DoS. [Read More]


Linux Kernel SMP "/proc" Race Condition Denial of Service
Unpatched. Secunia Advisory 21 of 44 in 2006. 13,800 views.
Release Date:
2006-05-31
Secunia Advisory ID:
SA20349
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Tony Griffiths has reported a vulnerability in the Linux Kernel, which can be exploited malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SNMP NAT Helper Denial of Service
Vendor Patch. Secunia Advisory 22 of 44 in 2006. 18,360 views.
Release Date:
2006-05-23
Secunia Advisory ID:
SA20225
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Netfilter Weakness and Two SCTP Vulnerabilities
Vendor Patch. Secunia Advisory 23 of 44 in 2006. 17,768 views.
Release Date:
2006-05-22
Secunia Advisory ID:
SA20185
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Two vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and disclose potentially sensitive information, and by malicious people to cause a DoS. [Read More]


Linux Kernel "lease_init()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 24 of 44 in 2006. 15,045 views.
Release Date:
2006-05-11
Secunia Advisory ID:
SA20083
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SCTP Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 44 in 2006. 16,254 views.
Release Date:
2006-05-09
Secunia Advisory ID:
SA19990
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Security Bypass and Denial of Service
Vendor Patch. Secunia Advisory 26 of 44 in 2006. 17,135 views.
Release Date:
2006-05-04
Secunia Advisory ID:
SA19926
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Two vulnerabilities have been reported in Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel SMBFS chroot Directory Traversal Vulnerability
Vendor Patch. Secunia Advisory 27 of 44 in 2006. 18,270 views.
Release Date:
2006-04-28
Secunia Advisory ID:
SA19869
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel CIFS chroot Directory Traversal Vulnerability
Vendor Patch. Secunia Advisory 28 of 44 in 2006. 15,958 views.
Release Date:
2006-04-28
Secunia Advisory ID:
SA19868
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
Marcel Holtmann has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel perfmon Local Denial of Service Vulnerability
Unpatched. Secunia Advisory 29 of 44 in 2006. 13,902 views.
Release Date:
2006-04-20
Secunia Advisory ID:
SA19737
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel x87 Register Information Leak
Vendor Patch. Secunia Advisory 30 of 44 in 2006. 17,215 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19724
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A security issue has been reported in Linux Kernel, which can be exploited by malicious, local users to gain knowledge of potentially sensitive information. [Read More]


Linux Kernel "ip_route_input()" Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 31 of 44 in 2006. 17,469 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19709
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Shared Memory Restrictions Bypass
Vendor Patch. Secunia Advisory 32 of 44 in 2006. 14,158 views.
Release Date:
2006-04-19
Secunia Advisory ID:
SA19657
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Program Control Return Denial of Service
Vendor Patch. Secunia Advisory 33 of 44 in 2006. 12,875 views.
Release Date:
2006-04-17
Secunia Advisory ID:
SA19639
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability and a weakness have been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "__keyring_search_one()" Denial of Service
Vendor Patch. Secunia Advisory 34 of 44 in 2006. 14,677 views.
Release Date:
2006-04-11
Secunia Advisory ID:
SA19573
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel SYSFS Local Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 35 of 44 in 2006. 21,582 views.
Release Date:
2006-04-07
Secunia Advisory ID:
SA19495
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IP ID Value Increment Weakness
Partial Fix. Secunia Advisory 36 of 44 in 2006. 19,089 views.
Release Date:
2006-03-28
Secunia Advisory ID:
SA19402
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
Exposure of system information
Where:
From remote
Short Description:
Marco Ivaldi has reported a weakness in the Linux kernel, which can be exploited by malicious people to disclose certain system information and potentially to bypass certain security restrictions. [Read More]


Linux Kernel IPv4 "sockaddr_in.sin_zero" Information Disclosure
Vendor Patch. Secunia Advisory 37 of 44 in 2006. 19,777 views.
Release Date:
2006-03-23
Secunia Advisory ID:
SA19357
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
Pavel Kankovsky has reported a weakness in the Linux kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel Netfilter Weakness and Four Vulnerabilities
Vendor Patch. Secunia Advisory 38 of 44 in 2006. 19,645 views.
Release Date:
2006-03-22
Secunia Advisory ID:
SA19330
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
Where:
Local system
Short Description:
A weakness and four vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), bypass certain security restrictions, or with unknown impacts. [Read More]


Linux Kernel "die_if_kernel()" Potential Denial of Service
Vendor Patch. Secunia Advisory 39 of 44 in 2006. 14,446 views.
Release Date:
2006-03-07
Secunia Advisory ID:
SA19078
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Local Denial of Service and Information Disclosure
Vendor Patch. Secunia Advisory 40 of 44 in 2006. 24,243 views.
Release Date:
2006-03-02
Secunia Advisory ID:
SA19083
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain knowledge of potentially sensitive information. [Read More]


Linux Kernel ICMP Error Handling Denial of Service
Vendor Patch. Secunia Advisory 41 of 44 in 2006. 17,981 views.
Release Date:
2006-02-08
Secunia Advisory ID:
SA18766
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Information Disclosure and Denial of Service
Vendor Patch. Secunia Advisory 42 of 44 in 2006. 14,344 views.
Release Date:
2006-01-17
Secunia Advisory ID:
SA18487
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information, and to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 43 of 44 in 2006. 13,097 views.
Release Date:
2006-01-16
Secunia Advisory ID:
SA18482
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 44 of 44 in 2006. 14,647 views.
Release Date:
2006-01-04
Secunia Advisory ID:
SA18216
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), gain knowledge of potentially sensitive information, bypass certain security restrictions, and with unknown impact. [Read More]


Linux Kernel Socket Data Buffering Denial of Service
Unpatched. Secunia Advisory 1 of 33 in 2005. 13,645 views.
Release Date:
2005-12-23
Secunia Advisory ID:
SA18205
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 2 of 33 in 2005. 17,329 views.
Release Date:
2005-11-29
Secunia Advisory ID:
SA17786
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel sysctl Interface Unregistration Denial of Service
Vendor Patch. Secunia Advisory 3 of 33 in 2005. 15,703 views.
Release Date:
2005-11-09
Secunia Advisory ID:
SA17504
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Potential Buffer Overflow and Denial of Service
Vendor Patch. Secunia Advisory 4 of 33 in 2005. 16,551 views.
Release Date:
2005-11-01
Secunia Advisory ID:
SA17384
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel. Two has an unknown impact, the others can potentially be exploited by malicious, local users to cause a DoS (Denial of Service) [Read More]


Linux Kernel IPv6 Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 5 of 33 in 2005. 15,006 views.
Release Date:
2005-10-21
Secunia Advisory ID:
SA17261
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Tetsuo Handa has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Console Keyboard Mapping Shell Command Injection
Vendor Patch. Secunia Advisory 6 of 33 in 2005. 21,869 views.
Release Date:
2005-10-17
Secunia Advisory ID:
SA17226
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Rudolf Polzer has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Potential Denial of Service and Information Disclosure
Vendor Patch. Secunia Advisory 7 of 33 in 2005. 15,483 views.
Release Date:
2005-10-11
Secunia Advisory ID:
SA17114
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From local network
Short Description:
Two vulnerabilities, a security issue, and a weakness have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) and bypass certain security restrictions, or by malicious people to disclose certain sensitive information. [Read More]


Linux Kernel URB and IPv6 Flowlabel Handling Denial of Service
Partial Fix. Secunia Advisory 8 of 33 in 2005. 15,284 views.
Release Date:
2005-09-27
Secunia Advisory ID:
SA16969
Solution Status:
Partial Fix
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities, a security issue, and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and by malicious people to cause a DoS. [Read More]


Linux Kernel "fget()" Potential Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 9 of 33 in 2005. 18,716 views.
Release Date:
2005-09-22
Secunia Advisory ID:
SA16897
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Vasiliy Averin has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 10 of 33 in 2005. 21,428 views.
Release Date:
2005-09-09
Secunia Advisory ID:
SA16747
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which potentially can be exploited by malicious, local users to disclose certain sensitive information, cause a DoS (Denial of Service) and gain escalated privileges, or by malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 11 of 33 in 2005. 16,488 views.
Release Date:
2005-08-25
Secunia Advisory ID:
SA16494
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose potentially sensitive information, and bypass certain security restrictions, or by malicious people to cause a DoS. [Read More]


Linux Kernel XDR Encode/Decode Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 12 of 33 in 2005. 16,577 views.
Release Date:
2005-08-12
Secunia Advisory ID:
SA16406
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
Florian Weimer has reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 13 of 33 in 2005. 18,460 views.
Release Date:
2005-08-09
Secunia Advisory ID:
SA16355
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users and potentially malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel xfrm Array Indexing Overflow Vulnerability
Vendor Patch. Secunia Advisory 14 of 33 in 2005. 16,353 views.
Release Date:
2005-08-05
Secunia Advisory ID:
SA16298
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Balazs Scheidler has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IA32 Compatibility "execve()" Buffer Overflow
Vendor Patch. Secunia Advisory 15 of 33 in 2005. 16,125 views.
Release Date:
2005-07-11
Secunia Advisory ID:
SA15980
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Ilja van Sprundel has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel "syscall()" Argument Handling Denial of Service
Unpatched. Secunia Advisory 16 of 33 in 2005. 16,695 views.
Release Date:
2005-06-27
Secunia Advisory ID:
SA15812
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 33 in 2005. 17,722 views.
Release Date:
2005-06-23
Secunia Advisory ID:
SA15786
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Security Bypass
DoS
Where:
From local network
Short Description:
Some vulnerabilities have been reported in the Linux kernel. The first has an unknown impact, the others can be exploited by malicious, local users to cause a DoS (Denial of Service), or by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel "ptrace()" and "mmap()" Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 33 in 2005. 14,370 views.
Release Date:
2005-06-09
Secunia Advisory ID:
SA15630
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Hyper-Threading Support Information Disclosure
Vendor Workaround. Secunia Advisory 19 of 33 in 2005. 12,708 views.
Release Date:
2005-05-23
Secunia Advisory ID:
SA15457
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel pktcdvd and raw device Block Device Vulnerabilities
Vendor Patch. Secunia Advisory 20 of 33 in 2005. 17,434 views.
Release Date:
2005-05-17
Secunia Advisory ID:
SA15392
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
alert7 has reported two vulnerabilities in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ELF Core Dump Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 21 of 33 in 2005. 17,117 views.
Release Date:
2005-05-12
Secunia Advisory ID:
SA15341
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Local Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 22 of 33 in 2005. 13,379 views.
Release Date:
2005-05-02
Secunia Advisory ID:
SA15204
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "is_hugepage_only_range()" Denial of Service
Unpatched. Secunia Advisory 23 of 33 in 2005. 11,018 views.
Release Date:
2005-04-04
Secunia Advisory ID:
SA14718
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Daniel McNeil has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 24 of 33 in 2005. 24,767 views.
Release Date:
2005-03-29
Secunia Advisory ID:
SA14713
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which can be exploited to disclose information, cause a DoS (Denial of Service), gain escalated privileges, or potentially compromise a vulnerable system. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 33 in 2005. 16,169 views.
Release Date:
2005-03-18
Secunia Advisory ID:
SA14585
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, the rest can be exploited by malicious, local users, or by malicious people, to cause a DoS (Denial of Service). [Read More]


Linux Kernel PPP Server Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 26 of 33 in 2005. 17,562 views.
Release Date:
2005-03-16
Secunia Advisory ID:
SA14570
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Ben Martel and Stephen Blackheath have reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sys_epoll_wait()" Function Integer Overflow
Vendor Patch. Secunia Advisory 27 of 33 in 2005. 16,642 views.
Release Date:
2005-03-15
Secunia Advisory ID:
SA14548
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Georgi Guninski has reported a potential vulnerability in the Linux kernel, which may be exploited by malicious people to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 28 of 33 in 2005. 34,071 views.
Release Date:
2005-02-16
Secunia Advisory ID:
SA14295
Solution Status:
Partial Fix
Criticality:
Impact:
Unknown
Hijacking
Security Bypass
Exposure of sensitive information
Privilege escalation
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux kernel. These can be exploited by malicious, local users to gain knowledge of potentially sensitive information, cause a DoS (Denial of Service), or gain escalated privileges, or by malicious people to cause a DoS or bypass certain security restrictions. [Read More]


Linux Kernel Memory Disclosure and Privilege Escalation
Vendor Patch. Secunia Advisory 29 of 33 in 2005. 14,455 views.
Release Date:
2005-02-15
Secunia Advisory ID:
SA14270
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to disclose kernel memory or gain escalated privileges. [Read More]


Linux Kernel NTFS Unspecified Denial of Service
Vendor Patch. Secunia Advisory 30 of 33 in 2005. 11,943 views.
Release Date:
2005-02-07
Secunia Advisory ID:
SA14117
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Carl-Daniel Hailfinger has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Page Fault Handler Privilege Escalation
Partial Fix. Secunia Advisory 31 of 33 in 2005. 18,348 views.
Release Date:
2005-01-13
Secunia Advisory ID:
SA13822
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Partial Fix. Secunia Advisory 32 of 33 in 2005. 21,836 views.
Release Date:
2005-01-11
Secunia Advisory ID:
SA13784
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service), disclose sensitive information, or gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel Binary Format Loaders Privilege Escalation
Partial Fix. Secunia Advisory 33 of 33 in 2005. 16,852 views.
Release Date:
2005-01-10
Secunia Advisory ID:
SA13756
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel SACF Instruction and tmpfs Vulnerabilities
Vendor Patch. Secunia Advisory 1 of 29 in 2004. 12,144 views.
Release Date:
2004-12-27
Secunia Advisory ID:
SA13654
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Unpatched. Secunia Advisory 2 of 29 in 2004. 21,370 views.
Release Date:
2004-12-22
Secunia Advisory ID:
SA13572
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. [Read More]


Linux Kernel "ip_options_get()" and "vc_resize()" Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 29 in 2004. 18,606 views.
Release Date:
2004-12-17
Secunia Advisory ID:
SA13493
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Georgi Guninski has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IGMP and "__scm_send()" Vulnerabilities
Vendor Patch. Secunia Advisory 4 of 29 in 2004. 17,353 views.
Release Date:
2004-12-15
Secunia Advisory ID:
SA13469
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
Where:
From local network
Short Description:
Paul Starzetz has reported some vulnerabilities in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service), and by malicious, local users to cause a DoS, gain knowledge of sensitive information, or potentially gain escalated privileges. [Read More]


Linux Kernel "sys32_ni_syscall" / "sys32_vm86_warning" Buffer Overflows
Vendor Patch. Secunia Advisory 5 of 29 in 2004. 15,568 views.
Release Date:
2004-12-09
Secunia Advisory ID:
SA13410
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Jeremy Fitzhardinge has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Local DoS and Memory Content Disclosure Vulnerabilities
Unpatched. Secunia Advisory 6 of 29 in 2004. 17,716 views.
Release Date:
2004-11-25
Secunia Advisory ID:
SA13308
Solution Status:
Unpatched
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain knowledge of potentially sensitive information. [Read More]


Linux Kernel smb Filesystem Implementation Multiple Vulnerabilities
Partial Fix. Secunia Advisory 7 of 29 in 2004. 22,890 views.
Release Date:
2004-11-18
Secunia Advisory ID:
SA13232
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
DoS
System access
Where:
From local network
Short Description:
Multiple vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to gain escalated privileges or by malicious people to cause a DoS (Denial of Service) or leak kernel memory. Reportedly, it is currently unclear whether some of the vulnerabilities also can be exploited for arbitrary code execution. [Read More]


Linux Kernel ELF Binary Loader Setuid File Handling Vulnerabilities
Partial Fix. Secunia Advisory 8 of 29 in 2004. 22,992 views.
Release Date:
2004-11-10
Secunia Advisory ID:
SA13126
Solution Status:
Partial Fix
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 9 of 29 in 2004. 16,372 views.
Release Date:
2004-10-22
Secunia Advisory ID:
SA12525
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Multiple vulnerabilities have been reported in the Linux kernel, which can be exploited to disclose kernel data, cause a DoS (Denial of Service), or bypass certain security restrictions. [Read More]


Linux Kernel Firewall Logging Rules Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 10 of 29 in 2004. 19,796 views.
Release Date:
2004-10-21
Secunia Advisory ID:
SA11202
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Richard Hart has reported a vulnerability in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ide-cd SG_IO Functionality Permission Bypass Vulnerability
Unpatched. Secunia Advisory 11 of 29 in 2004. 14,092 views.
Release Date:
2004-09-28
Secunia Advisory ID:
SA12498
Solution Status:
Unpatched
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel NFS and ptmx Denial of Service Vulnerabilities
Unpatched. Secunia Advisory 12 of 29 in 2004. 13,428 views.
Release Date:
2004-09-02
Secunia Advisory ID:
SA12426
Solution Status:
Unpatched
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
Two vulnerabilities have been reported in the Linux Kernel, allowing malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel File Offset Pointer Handling Memory Disclosure Vulnerability
Partial Fix. Secunia Advisory 13 of 29 in 2004. 15,999 views.
Release Date:
2004-08-04
Secunia Advisory ID:
SA12210
Solution Status:
Partial Fix
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to disclose sensitive information in kernel memory. [Read More]


Linux Kernel File Group ID Manipulation Vulnerability
Vendor Patch. Secunia Advisory 14 of 29 in 2004. 19,006 views.
Release Date:
2004-07-02
Secunia Advisory ID:
SA11996
Solution Status:
Vendor Patch
Criticality:
Impact:
Manipulation of data
Where:
From local network
Short Description:
SuSE has discovered a vulnerability in the Linux kernel, which can be exploited by malicious users to bypass certain security restrictions. [Read More]


Linux Kernel Netfilter TCP Option Matching Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 15 of 29 in 2004. 17,155 views.
Release Date:
2004-07-01
Secunia Advisory ID:
SA11980
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Adam Osuchowski and Tomasz Dubinski have reported a vulnerability in the Linux kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel IEEE 1394 Driver Integer Overflow Vulnerabilities
Unpatched. Secunia Advisory 16 of 29 in 2004. 14,997 views.
Release Date:
2004-06-24
Secunia Advisory ID:
SA11931
Solution Status:
Unpatched
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
infamous41md has reported some vulnerabilities in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel Various Drivers Userland Pointer Dereference Vulnerabilities
Vendor Patch. Secunia Advisory 17 of 29 in 2004. 14,674 views.
Release Date:
2004-06-21
Secunia Advisory ID:
SA11891
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
Vulnerabilities have been discovered in various drivers for the Linux kernel, which can be exploited by malicious, local users to disclose kernel memory or gain escalated privileges. [Read More]


Linux Kernel "__clear_fpu()" Macro Denial of Service Vulnerability
Vendor Patch. Secunia Advisory 18 of 29 in 2004. 17,284 views.
Release Date:
2004-06-15
Secunia Advisory ID:
SA11861
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Stian Skjelstad has reported a vulnerability in the Linux kernel allowing malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel e1000 Network Driver Kernel Memory Disclosure
Vendor Patch. Secunia Advisory 19 of 29 in 2004. 16,323 views.
Release Date:
2004-05-21
Secunia Advisory ID:
SA11626
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been discovered in the Linux kernel, potentially allowing malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel IO Bitmap Access Permissions Inheritance Vulnerability
Vendor Patch. Secunia Advisory 20 of 29 in 2004. 13,201 views.
Release Date:
2004-05-10
Secunia Advisory ID:
SA11577
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Stas Sergeev has reported a vulnerability in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Framebuffer Driver Direct Userspace Access Vulnerability
Partial Fix. Secunia Advisory 21 of 29 in 2004. 16,320 views.
Release Date:
2004-04-28
Secunia Advisory ID:
SA11486
Solution Status:
Partial Fix
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
Arjan van de Ven has reported a vulnerability in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel CPUFREQ Proc Handler Kernel Memory Disclosure Vulnerability
Vendor Patch. Secunia Advisory 22 of 29 in 2004. 20,404 views.
Release Date:
2004-04-23
Secunia Advisory ID:
SA11464
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of system information
Exposure of sensitive information
Where:
Local system
Short Description:
Brad Spengler has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain knowledge of sensitive information. [Read More]


Linux Kernel setsockopt MCAST_MSFILTER Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 23 of 29 in 2004. 15,046 views.
Release Date:
2004-04-20
Secunia Advisory ID:
SA11429
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz and Wojciech Purczynski have reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel ISO9660 Buffer Overflow Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 24 of 29 in 2004. 16,684 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11361
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
iDEFENSE has discovered a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel File Systems Information Leak and Denial of Service
Vendor Patch. Secunia Advisory 25 of 29 in 2004. 16,953 views.
Release Date:
2004-04-15
Secunia Advisory ID:
SA11362
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Multiple vulnerabilities have reportedly been fixed in the latest kernel releases. These may allow malicious, local users to cause a DoS (Denial of Service) or gain knowledge of sensitive information. [Read More]


Linux kernel ncpfs Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 26 of 29 in 2004. 19,220 views.
Release Date:
2004-02-19
Secunia Advisory ID:
SA10912
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Arjan van de Ven has discovered a vulnerability in the Linux kernel, allowing malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel Vicam USB Driver Insecure Userspace Access
Vendor Patch. Secunia Advisory 27 of 29 in 2004. 15,464 views.
Release Date:
2004-02-19
Secunia Advisory ID:
SA10911
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "mremap()" Missing Return Value Checking Privilege Escalation
Vendor Patch. Secunia Advisory 28 of 29 in 2004. 20,722 views.
Release Date:
2004-02-18
Secunia Advisory ID:
SA10897
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges on a vulnerable system. [Read More]


Linux Kernel "mremap()" Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 29 of 29 in 2004. 24,572 views.
Release Date:
2004-01-05
Secunia Advisory ID:
SA10532
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Paul Starzetz and Wojciech Purczynski have reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to escalate their privileges. [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Linux Kernel 2.6.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability