Linux

Linux Kernel

12957 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.66%
  • Veröffentlicht 27.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a den...

  • EPSS 5.93%
  • Veröffentlicht 27.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer signedness error in the decode_fh function of nfs3xdr.c in Linux kernel before 2.4.21 allows remote attackers to cause a denial of service (kernel panic) via a negative size value within XDR data of an NFSv3 procedure call.

  • EPSS 0.47%
  • Veröffentlicht 18.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.

  • EPSS 0.15%
  • Veröffentlicht 07.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The execve system call in Linux 2.4.x records the file descriptor of the executable process in the file table of the calling process, which allows local users to gain read access to restricted file descriptors.

  • EPSS 0.37%
  • Veröffentlicht 07.08.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The /proc filesystem in Linux allows local users to obtain sensitive information by opening various entries in /proc/self before executing a setuid program, which causes the program to fail to change the ownership and permissions of those entries.

  • EPSS 0.08%
  • Veröffentlicht 25.07.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

Integer signedness error in the Linux Socket Filter implementation (filter.c) in Linux 2.4.3-pre3 to 2.4.22-pre10 allows attackers to cause a denial of service (crash).

Exploit
  • EPSS 0.93%
  • Veröffentlicht 24.07.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The Linux 2.0 kernel IP stack does not properly calculate the size of an ICMP citation, which causes it to include portions of unauthorized memory in ICMP error responses.

  • EPSS 0.12%
  • Veröffentlicht 16.06.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.

  • EPSS 6.89%
  • Veröffentlicht 27.05.2003 04:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.

  • EPSS 0.95%
  • Veröffentlicht 31.03.2003 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.