Filtered by vendor Linux Subscriptions
Filtered by product Linux Kernel Subscriptions
Total 13441 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-1999-1166 1 Linux 1 Linux Kernel 2025-04-03 N/A
Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory.
CVE-2005-1765 1 Linux 1 Linux Kernel 2025-04-03 N/A
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
CVE-2006-2934 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
SCTP conntrack (ip_conntrack_proto_sctp.c) in netfilter for Linux kernel 2.6.17 before 2.6.17.3 and 2.6.16 before 2.6.16.23 allows remote attackers to cause a denial of service (crash) via a packet without any chunks, which causes a variable to contain an invalid value that is later used to dereference a pointer.
CVE-2001-1056 1 Linux 1 Linux Kernel 2025-04-03 N/A
IRC DCC helper in the ip_masq_irc IP masquerading module 2.2 allows remote attackers to bypass intended firewall restrictions by causing the target system to send a "DCC SEND" request to a malicious server which listens on port 6667, which may cause the module to believe that the traffic is a valid request and allow the connection to the port specified in the DCC SEND request.
CVE-2006-4663 1 Linux 1 Linux Kernel 2025-04-03 7.8 High
The source code tar archive of the Linux kernel 2.6.16, 2.6.17.11, and possibly other versions specifies weak permissions (0666 and 0777) for certain files and directories, which might allow local users to insert Trojan horse source code that would be used during the next kernel compilation. NOTE: another researcher disputes the vulnerability, stating that he finds "Not a single world-writable file or directory." CVE analysis as of 20060908 indicates that permissions will only be weak under certain unusual or insecure scenarios
CVE-1999-0061 4 Bsdi, Freebsd, Linux and 1 more 4 Bsd Os, Freebsd, Linux Kernel and 1 more 2025-04-03 N/A
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
CVE-2005-4811 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The hugepage code (hugetlb.c) in Linux kernel 2.6, possibly 2.6.12 and 2.6.13, in certain configurations, allows local users to cause a denial of service (crash) by triggering an mmap error before a prefault, which causes an error in the unmap_hugepage_area function.
CVE-1999-1285 1 Linux 1 Linux Kernel 2025-04-03 N/A
Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.
CVE-2004-0109 2 Linux, Redhat 3 Linux Kernel, Enterprise Linux, Linux 2025-04-03 N/A
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
CVE-2005-3753 1 Linux 1 Linux Kernel 2025-04-03 N/A
Linux kernel before after 2.6.12 and before 2.6.13.1 might allow attackers to cause a denial of service (Oops) via certain IPSec packets that cause alignment problems in standard multi-block cipher processors. NOTE: it is not clear whether this issue can be triggered by an attacker.
CVE-2001-0851 4 Caldera, Linux, Redhat and 1 more 8 Openlinux, Openlinux Edesktop, Openlinux Eserver and 5 more 2025-04-03 N/A
Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
CVE-2003-1332 3 Linux, Redhat, Samba 3 Linux Kernel, Enterprise Linux, Samba 2025-04-03 N/A
Stack-based buffer overflow in the reply_nttrans function in Samba 2.2.7a and earlier allows remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2003-0201.
CVE-2004-0058 1 Linux 1 Linux Kernel 2025-04-03 N/A
Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file.
CVE-2003-0244 2 Linux, Redhat 3 Linux Kernel, Enterprise Linux, Linux 2025-04-03 N/A
The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.
CVE-2005-3847 2 Debian, Linux 2 Debian Linux, Linux Kernel 2025-04-03 5.5 Medium
The handle_stop_signal function in signal.c in Linux kernel 2.6.11 up to other versions before 2.6.13 and 2.6.12.6 allows local users to cause a denial of service (deadlock) by sending a SIGKILL to a real-time threaded process while it is performing a core dump.
CVE-2005-0135 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
CVE-2005-0204 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction.
CVE-1999-0431 1 Linux 1 Linux Kernel 2025-04-03 N/A
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
CVE-2005-0210 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
Netfilter in the Linux kernel 2.6.8.1 allows local users to cause a denial of service (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice.
CVE-2006-1242 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.