Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Secure_linux
(Trustix)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 66 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-12-06 | CVE-2004-0565 | Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. | Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Secure_linux | N/A | ||
2004-12-06 | CVE-2004-0497 | Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4. | Linux, Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Enterprise_linux, Suse_linux, Secure_linux | N/A | ||
2004-08-18 | CVE-2004-0432 | ProFTPD 1.2.9 treats the Allow and Deny directives for CIDR based ACL entries as if they were AllowAll, which could allow FTP clients to bypass intended access restrictions. | Linux, Proftpd, Secure_linux | N/A | ||
2004-11-23 | CVE-2004-0415 | Linux kernel does not properly convert 64-bit file offset pointers to 32 bits, which allows local users to access portions of kernel memory. | Linux_kernel, Fedora_core, Secure_linux | N/A | ||
2004-03-03 | CVE-2004-0077 | The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985. | Linux_kernel, Netwosix_linux, Bigmem_kernel, Kernel, Kernel_doc, Kernel_source, Secure_linux | N/A | ||
2002-12-11 | CVE-2002-1319 | The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs. | Linux_kernel, Secure_linux | N/A | ||
2001-07-18 | CVE-2001-1030 | Squid before 2.3STABLE5 in HTTP accelerator mode does not enable access control lists (ACLs) when the httpd_accel_host and http_accel_with_proxy off settings are used, which allows attackers to bypass the ACLs and conduct unauthorized activities such as port scanning. | Openlinux_server, Immunix, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_single_network_firewall, Linux, Squid_web_proxy, Secure_linux | N/A | ||
2001-03-26 | CVE-2001-0169 | When using the LD_PRELOAD environmental variable in SUID or SGID applications, glibc does not verify that preloaded libraries in /etc/ld.so.cache are also SUID/SGID, which could allow a local user to overwrite arbitrary files by loading a library from /lib or /usr/lib. | Mandrake_linux, Mandrake_linux_corporate_server, Linux, Secure_linux, Turbolinux | N/A | ||
2001-03-12 | CVE-2001-0142 | squid 2.3 and earlier allows local users to overwrite arbitrary files via a symlink attack in some configurations. | Immunix, Mandrake_linux, Squid_web_proxy, Linux, Secure_linux | N/A | ||
2001-03-12 | CVE-2001-0117 | sdiff 2.7 in the diffutils package allows local users to overwrite files via a symlink attack. | Immunix, Mandrake_linux, Mandrake_linux_corporate_server, Linux, Secure_linux | N/A |