CVE-2003-0984
- EPSS 0.11%
- Veröffentlicht 05.01.2004 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
CVE-2003-0956
- EPSS 0.08%
- Veröffentlicht 31.12.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Multiple race conditions in the handling of O_DIRECT in Linux kernel prior to version 2.4.22 could cause stale data to be returned from the disk when handling sparse files, or cause incorrect data to be returned when a file is truncated as it is bein...
CVE-2003-0986
- EPSS 0.06%
- Veröffentlicht 31.12.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to...
CVE-2003-1161
- EPSS 0.07%
- Veröffentlicht 31.12.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
exit.c in Linux kernel 2.6-test9-CVS, as stored on kernel.bkbits.net, was modified to contain a backdoor, which could allow local users to elevate their privileges by passing __WCLONE|__WALL to the sys_wait4 function.
CVE-2003-0961
- EPSS 1.3%
- Veröffentlicht 15.12.2003 05:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges.
- EPSS 0.66%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The connection tracking core of Netfilter for Linux 2.4.20, with CONFIG_IP_NF_CONNTRACK enabled or the ip_conntrack module loaded, allows remote attackers to cause a denial of service (resource consumption) due to an inconsistency with Linux 2.4.20's...
CVE-2003-0462
- EPSS 0.27%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
A race condition in the way env_start and env_end pointers are initialized in the execve system call and used in fs/proc/base.c on Linux 2.4 allows local users to cause a denial of service (crash).
- EPSS 0.66%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a den...
- EPSS 5.93%
- Veröffentlicht 27.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.
- EPSS 0.47%
- Veröffentlicht 18.08.2003 04:00:00
- Zuletzt bearbeitet 03.04.2025 01:03:51
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.