Linux

Linux Kernel

12152 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to...

Exploit
  • EPSS 0.07%
  • Published 31.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function.

  • EPSS 1.3%
  • Published 15.12.2003 05:00:00
  • Last modified 03.04.2025 01:03:51

Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.

  • EPSS 0.66%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The connection tracking core of Netfilter for Linux 2.4.20, with CONFIG_IP_NF_CONNTRACK enabled or the ip_conntrack module loaded, allows remote attackers to cause a denial of service (resource consumption) due to an inconsistency with Linux 2.4.20's...

  • EPSS 0.27%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).

  • EPSS 0.66%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a den...

  • EPSS 5.93%
  • Published 27.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.

  • EPSS 0.47%
  • Published 18.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

  • EPSS 0.15%
  • Published 07.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.

  • EPSS 0.37%
  • Published 07.08.2003 04:00:00
  • Last modified 03.04.2025 01:03:51

The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.