Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading

Vulnerability Report: Linux Kernel 2.6.x

This vulnerability report for Linux Kernel 2.6.x contains a complete overview of all Secunia advisories affecting it. You can use this vulnerability report to ensure that you are aware of all vulnerabilities, both patched and unpatched, affecting this product allowing you to take the necessary precautions.

If you have information about a new or an existing vulnerability in Linux Kernel 2.6.x then you are more than welcome to contact us.


Table of Contents

1. Product Summary Only

2. Secunia Advisory Statistics (All time)
2.1. Statistics for 2014
2.2. Statistics for 2013
2.3. Statistics for 2012
2.4. Statistics for 2011
2.5. Statistics for 2010
2.6. Statistics for 2009
2.7. Statistics for 2008
2.8. Statistics for 2007
2.9. Statistics for 2006
2.10. Statistics for 2005
2.11. Statistics for 2004
2.12. Statistics for 2003

3. List of Secunia Advisories (All time)
3.1. List for 2014
3.2. List for 2013
3.3. List for 2012
3.4. List for 2011
3.5. List for 2010
3.6. List for 2009
3.7. List for 2008
3.8. List for 2007
3.9. List for 2006
3.10. List for 2005
3.11. List for 2004
3.12. List for 2003

4. Send Feedback
 
Vendor, Links, and Unpatched Vulnerabilities

Vendor Kernel.org

Product Link View Here (Link to external site)

Affected By 337 Secunia advisories
693 Vulnerabilities

Monitor Product Receive alerts for this product

Unpatched 7% (25 of 337 Secunia advisories)

Most Critical Unpatched
The most severe unpatched Secunia advisory affecting Linux Kernel 2.6.x, with all vendor patches applied, is rated Moderately critical .




32 Secunia Advisories in 2007

Secunia has issued a total of 32 Secunia advisories in 2007 for Linux Kernel 2.6.x. Currently, 0% (0 out of 32) are marked as unpatched.

More information about the specific Secunia advisories affecting Linux Kernel 2.6.x can be found below. Each Secunia advisory is enclosed by a box highlighted with a color representing its current patch status. You can read the complete Secunia advisories for thorough descriptions of the issues covered and for solution suggestions by clicking either the Secunia advisory title or the "Read More" links available for each Secunia advisory.



Linux Kernel "hrtimer_start()" Integer Overflow Vulnerability
Vendor Patch. Secunia Advisory 1 of 32 in 2007. 13,154 views.
Release Date:
2007-12-17
Secunia Advisory ID:
SA28105
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with an unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel "mmap_min_addr" Security Bypass
Vendor Workaround. Secunia Advisory 2 of 32 in 2007. 13,504 views.
Release Date:
2007-12-12
Secunia Advisory ID:
SA28070
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 3 of 32 in 2007. 15,534 views.
Release Date:
2007-12-05
Secunia Advisory ID:
SA27908
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Privilege escalation
Where:
Local system
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information or gain escalated privileges. [Read More]


Linux Kernel "isdn_net_setcfg()" Buffer Overflow Vulnerability
Vendor Patch. Secunia Advisory 4 of 32 in 2007. 15,693 views.
Release Date:
2007-11-30
Secunia Advisory ID:
SA27842
Solution Status:
Vendor Patch
Criticality:
Impact:
Unknown
Where:
Local system
Short Description:
A vulnerability with unknown impact has been reported in the Linux Kernel. [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 5 of 32 in 2007. 16,004 views.
Release Date:
2007-11-19
Secunia Advisory ID:
SA27664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users and by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel CIFS "SendReceive()" Buffer Overflow
Vendor Workaround. Secunia Advisory 6 of 32 in 2007. 15,126 views.
Release Date:
2007-11-14
Secunia Advisory ID:
SA27666
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
System access
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. [Read More]


Linux Kernel Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 7 of 32 in 2007. 14,411 views.
Release Date:
2007-11-08
Secunia Advisory ID:
SA27555
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users or by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel ALSA "snd_mem_proc_read()" Information Disclosure
Vendor Patch. Secunia Advisory 8 of 32 in 2007. 12,721 views.
Release Date:
2007-09-26
Secunia Advisory ID:
SA26918
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information. [Read More]


Linux Kernel ptrace Single Step "CS" Null Pointer Dereference
Vendor Workaround. Secunia Advisory 9 of 32 in 2007. 12,714 views.
Release Date:
2007-09-25
Secunia Advisory ID:
SA26935
Solution Status:
Vendor Workaround
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Evan Teran has reported a security issue in the Linux kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel ptrace Local Privilege Escalation Vulnerability
Vendor Patch. Secunia Advisory 10 of 32 in 2007. 15,841 views.
Release Date:
2007-09-24
Secunia Advisory ID:
SA26934
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
Where:
Local system
Short Description:
Wojciech Purczynski has reported a vulnerability in the Linux kernel, which can be exploited by malicious, local users to gain escalated privileges. [Read More]


Linux Kernel Denial of Service and Privilege Escalation
Vendor Patch. Secunia Advisory 11 of 32 in 2007. 14,583 views.
Release Date:
2007-08-10
Secunia Advisory ID:
SA26389
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Privilege escalation
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) and gain escalated privileges. [Read More]


Linux Kernel CIFS Signing Options Weakness
Vendor Workaround. Secunia Advisory 12 of 32 in 2007. 14,110 views.
Release Date:
2007-08-09
Secunia Advisory ID:
SA26366
Solution Status:
Vendor Workaround
Criticality:
Impact:
Security Bypass
Where:
From local network
Short Description:
A weakness has been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions. [Read More]


Linux Kernel AACRAID Driver IOCTL Security Bypass
Vendor Patch. Secunia Advisory 13 of 32 in 2007. 16,539 views.
Release Date:
2007-08-06
Secunia Advisory ID:
SA26322
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions. [Read More]


Linux Kernel Security Bypass and Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 14 of 32 in 2007. 15,570 views.
Release Date:
2007-07-09
Secunia Advisory ID:
SA25955
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions and cause a DoS (Denial of Service), and malicious people to cause a DoS. [Read More]


Linux Kernel Multiple Security Issues
Vendor Patch. Secunia Advisory 15 of 32 in 2007. 14,939 views.
Release Date:
2007-07-02
Secunia Advisory ID:
SA25895
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
Privilege escalation
DoS
Where:
Local system
Short Description:
Some security issues have been reported in the Linux Kernel, which can be exploited by malicious, local users to bypass certain security restrictions, to gain escalated privileges, or to cause a DoS (Denial of Service). [Read More]


Linux Kernel "sysfs_readdir()" Denial of Service
Vendor Patch. Secunia Advisory 16 of 32 in 2007. 12,132 views.
Release Date:
2007-06-26
Secunia Advisory ID:
SA25771
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a Denial of Service (DoS). [Read More]


Linux Kernel "compat_sys_mount()" Denial of Service Security Issue
Vendor Patch. Secunia Advisory 17 of 32 in 2007. 12,996 views.
Release Date:
2007-06-15
Secunia Advisory ID:
SA25682
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Patch. Secunia Advisory 18 of 32 in 2007. 17,851 views.
Release Date:
2007-06-08
Secunia Advisory ID:
SA25594
Solution Status:
Vendor Patch
Criticality:
Impact:
Brute force
Exposure of sensitive information
DoS
Where:
From remote
Short Description:
Some vulnerabilities and a weakness have been reported in the Linux Kernel, which can be exploited by malicious, local users to disclose potentially sensitive information and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel VFAT IOCTLs and IPv6 Jumbogram Denial of Service
Vendor Patch. Secunia Advisory 19 of 32 in 2007. 13,110 views.
Release Date:
2007-06-01
Secunia Advisory ID:
SA25505
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A security issue and a vulnerability have been reported in the Linux Kernel, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel GEODE-AES Encryption Security Issue
Vendor Patch. Secunia Advisory 20 of 32 in 2007. 13,524 views.
Release Date:
2007-05-25
Secunia Advisory ID:
SA25398
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
Brute force
Where:
Local system
Short Description:
A security issue has been reported in the Linux Kernel, which can be exploited by malicious people to disclose potentially sensitive information. [Read More]


Linux Kernel Multiple Vulnerabilities
Vendor Workaround. Secunia Advisory 21 of 32 in 2007. 14,506 views.
Release Date:
2007-05-08
Secunia Advisory ID:
SA25163
Solution Status:
Vendor Workaround
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel netlink NETLINK_FIB_LOOKUP Denial of Service
Vendor Patch. Secunia Advisory 22 of 32 in 2007. 11,600 views.
Release Date:
2007-05-01
Secunia Advisory ID:
SA25030
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel IPv6 Type 0 Route Headers and RTA_MAX Denial of Service
Vendor Patch. Secunia Advisory 23 of 32 in 2007. 16,220 views.
Release Date:
2007-04-30
Secunia Advisory ID:
SA25068
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From remote
Short Description:
A vulnerability and a security issue have been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "atalk_sum_skb()" AppleTalk Denial of Service
Vendor Patch. Secunia Advisory 24 of 32 in 2007. 12,215 views.
Release Date:
2007-04-10
Secunia Advisory ID:
SA24793
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel Multiple Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 25 of 32 in 2007. 17,778 views.
Release Date:
2007-03-23
Secunia Advisory ID:
SA24618
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel NULL Pointer Dereferences and Security Bypass
Vendor Patch. Secunia Advisory 26 of 32 in 2007. 17,240 views.
Release Date:
2007-03-14
Secunia Advisory ID:
SA24492
Solution Status:
Vendor Patch
Criticality:
Impact:
Security Bypass
DoS
Where:
From remote
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which potentially can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service). [Read More]


Linux Kernel "ipv6_getsockopt_sticky()" DoS and Information Leak
Vendor Patch. Secunia Advisory 27 of 32 in 2007. 14,964 views.
Release Date:
2007-03-12
Secunia Advisory ID:
SA24493
Solution Status:
Vendor Patch
Criticality:
Impact:
Exposure of sensitive information
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or disclose potentially sensitive information. [Read More]


Linux Kernel Omnikey CardMan 4040 Driver Buffer Overflow
Vendor Patch. Secunia Advisory 28 of 32 in 2007. 16,065 views.
Release Date:
2007-03-08
Secunia Advisory ID:
SA24436
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS (Denial of Service) or gain escalated privileges. [Read More]


Linux Kernel NFSACL "ACCESS" Denial of Service
Vendor Patch. Secunia Advisory 29 of 32 in 2007. 14,918 views.
Release Date:
2007-02-20
Secunia Advisory ID:
SA24215
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
From local network
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious people to cause a DoS (Denial of Service). [Read More]


Linux Kernel "key_alloc_serial()" Denial of Service
Vendor Patch. Secunia Advisory 30 of 32 in 2007. 13,138 views.
Release Date:
2007-02-13
Secunia Advisory ID:
SA24109
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
A vulnerability has been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]


Linux Kernel "listxattr" Memory Corruption and Denial of Service
Vendor Patch. Secunia Advisory 31 of 32 in 2007. 16,435 views.
Release Date:
2007-01-31
Secunia Advisory ID:
SA23955
Solution Status:
Vendor Patch
Criticality:
Impact:
Privilege escalation
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or potentially gain escalated privileges. [Read More]


Linux Kernel Local Denial of Service Vulnerabilities
Vendor Patch. Secunia Advisory 32 of 32 in 2007. 13,488 views.
Release Date:
2007-01-11
Secunia Advisory ID:
SA23664
Solution Status:
Vendor Patch
Criticality:
Impact:
DoS
Where:
Local system
Short Description:
Some vulnerabilities have been reported in the Linux Kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). [Read More]





Discuss this Product
A new thread in our forum is automatically created for each Product. Activate the thread by commenting/discussing below.
Subject: Linux Kernel 2.6.x 
No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability