Linux Desktop Novell Linux Desktop

Do you want an email whenever new security vulnerabilities are reported in Novell Linux Desktop?

By the Year

In 2024 there have been 0 vulnerabilities in Novell Linux Desktop . Linux Desktop did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Linux Desktop vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Novell Linux Desktop Security Vulnerabilities

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6

CVE-2009-3547 7 - High - November 04, 2009

Multiple race conditions in fs/pipe.c in the Linux kernel before 2.6.32-rc6 allow local users to cause a denial of service (NULL pointer dereference and system crash) or gain privileges by attempting to open an anonymous pipe via a /proc/*/fd/ pathname.

Race Condition

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which

CVE-2009-2848 - August 18, 2009

The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.

Improper Privilege Management

nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13

CVE-2008-5021 - November 13, 2008

nsFrameManager in Firefox 3.x before 3.0.4, Firefox 2.x before 2.0.0.18, Thunderbird 2.x before 2.0.0.18, and SeaMonkey 1.x before 1.1.13 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code by modifying properties of a file input element while it is still being initialized, then using the blur method to access uninitialized memory.

Race Condition

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which

CVE-2007-6716 5.5 - Medium - September 04, 2008

fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test.

The Linux kernel before 2.6.25.10 does not properly perform tty operations, which

CVE-2008-2812 7.8 - High - July 09, 2008

The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/.

NULL Pointer Dereference

Linux kernel 2.6 and 2.4 on the IA64 architecture

CVE-2005-1761 - August 05, 2005

Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.

Improper Input Validation

traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which

CVE-2005-1767 - August 05, 2005

traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Suse Linux or by Novell? Click the Watch button to subscribe.

Novell
Vendor

subscribe