Filtered by vendor Linux Subscriptions
Filtered by product Linux Kernel Subscriptions
Total 17143 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2006-3626 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
CVE-2002-0570 1 Linux 1 Linux Kernel 2025-04-03 N/A
The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key.
CVE-2001-0316 2 Linux, Redhat 2 Linux Kernel, Linux 2025-04-03 N/A
Linux kernel 2.4 and 2.2 allows local users to read kernel memory and possibly gain privileges via a negative argument to the sysctl call.
CVE-2005-2708 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.
CVE-2005-2709 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
CVE-2005-2973 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The udp_v6_get_port function in udp.c in Linux 2.6 before 2.6.14-rc5, when running IPv6, allows local users to cause a denial of service (infinite loop and crash).
CVE-2005-0124 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.
CVE-2006-1368 1 Linux 1 Linux Kernel 2025-04-03 N/A
Buffer overflow in the USB Gadget RNDIS implementation in the Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (kmalloc'd memory corruption) via a remote NDIS response to OID_GEN_SUPPORTED_LIST, which causes memory to be allocated for the reply data but not the reply structure.
CVE-2005-3806 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The IPv6 flow label handling code (ip6_flowlabel.c) in Linux kernels 2.4 up to 2.4.32 and 2.6 before 2.6.14 modifies the wrong variable in certain circumstances, which allows local users to corrupt kernel memory or cause a denial of service (crash) by triggering a free of non-allocated memory.
CVE-1999-0074 4 Freebsd, Linux, Microsoft and 1 more 4 Freebsd, Linux Kernel, Windows Nt and 1 more 2025-04-03 N/A
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
CVE-2005-2458 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
CVE-2006-0095 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key.
CVE-1999-0461 2 Linux, Sgi 2 Linux Kernel, Irix 2025-04-03 N/A
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
CVE-2005-0400 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
CVE-1999-0183 2 Linux, Tftp 2 Linux Kernel, Tftp 2025-04-03 N/A
Linux implementations of TFTP would allow access to files outside the restricted directory.
CVE-2006-2448 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
Linux kernel before 2.6.16.21 and 2.6.17, when running on PowerPC, does not perform certain required access_ok checks, which allows local users to read arbitrary kernel memory on 64-bit systems (signal_64.c) and cause a denial of service (crash) and possibly read kernel memory on 32-bit systems (signal_32.c).
CVE-2006-2451 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions.
CVE-2006-1055 1 Linux 1 Linux Kernel 2025-04-03 N/A
The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read.
CVE-2006-1342 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
net/ipv4/af_inet.c in Linux kernel 2.4 does not clear sockaddr_in.sin_zero before returning IPv4 socket names from the (1) getsockname, (2) getpeername, and (3) accept functions, which allows local users to obtain portions of potentially sensitive memory.
CVE-2006-1242 2 Linux, Redhat 2 Linux Kernel, Enterprise Linux 2025-04-03 N/A
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.