Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
12 vulnerabilities found for linux-vserver by vserver
CVE-2003-1288 (GCVE-0-2003-1288)
Vulnerability from nvd – Published: 2005-12-04 11:00 – Updated: 2024-08-08 02:19
VLAI?
Summary
Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Date Public ?
2003-12-18 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:19:46.091Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7587"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-12-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-08T10:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7587"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1288",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "CONFIRM",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7587"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1288",
"datePublished": "2005-12-04T11:00:00.000Z",
"dateReserved": "2005-12-04T00:00:00.000Z",
"dateUpdated": "2024-08-08T02:19:46.091Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2613 (GCVE-0-2004-2613)
Vulnerability from nvd – Published: 2005-12-04 11:00 – Updated: 2024-08-08 01:36
VLAI?
Summary
Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Date Public ?
2004-01-08 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:36:24.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7586",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7586"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-01-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to \"write access to specific proc entries from a vserver context\", a different vulnerability than CVE-2004-2408."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-08T10:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7586",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7586"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2613",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to \"write access to specific proc entries from a vserver context\", a different vulnerability than CVE-2004-2408."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7586",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7586"
},
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "CONFIRM",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2613",
"datePublished": "2005-12-04T11:00:00.000Z",
"dateReserved": "2005-12-04T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:36:24.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2408 (GCVE-0-2004-2408)
Vulnerability from nvd – Published: 2005-08-18 04:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Date Public ?
2004-07-03 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:12.538Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-07-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "MISC",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2408",
"datePublished": "2005-08-18T04:00:00.000Z",
"dateReserved": "2005-08-18T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:12.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0178 (GCVE-0-2005-0178)
Vulnerability from nvd – Published: 2005-02-16 05:00 – Updated: 2024-08-07 21:05
VLAI?
Summary
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2005-02-15 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:05:25.299Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux.bkbits.net:8080/linux-2.6/cset@41ddda70CWJb5nNL71T4MOlG2sMG8A",
"refsource": "CONFIRM",
"url": "http://linux.bkbits.net:8080/linux-2.6/cset@41ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0178",
"datePublished": "2005-02-16T05:00:00.000Z",
"dateReserved": "2005-01-28T00:00:00.000Z",
"dateUpdated": "2024-08-07T21:05:25.299Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2003-1288 (GCVE-0-2003-1288)
Vulnerability from cvelistv5 – Published: 2005-12-04 11:00 – Updated: 2024-08-08 02:19
VLAI?
Summary
Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Date Public ?
2003-12-18 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T02:19:46.091Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7587"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2003-12-18T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-08T10:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7587"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2003-1288",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "CONFIRM",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20031219 Re: SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"name": "[Vserver] 20031220 Re: SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"name": "[Vserver] 20031218 SMP oops 2.4.23 v1.22",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"name": "7587",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7587"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2003-1288",
"datePublished": "2005-12-04T11:00:00.000Z",
"dateReserved": "2005-12-04T00:00:00.000Z",
"dateUpdated": "2024-08-08T02:19:46.091Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2613 (GCVE-0-2004-2613)
Vulnerability from cvelistv5 – Published: 2005-12-04 11:00 – Updated: 2024-08-08 01:36
VLAI?
Summary
Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Date Public ?
2004-01-08 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:36:24.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "7586",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7586"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-01-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to \"write access to specific proc entries from a vserver context\", a different vulnerability than CVE-2004-2408."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2005-12-08T10:00:00.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "7586",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7586"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2613",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to \"write access to specific proc entries from a vserver context\", a different vulnerability than CVE-2004-2408."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "7586",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7586"
},
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "CONFIRM",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "[Vserver] 20050108 [Advisory] procfs in vserver",
"refsource": "MLIST",
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2613",
"datePublished": "2005-12-04T11:00:00.000Z",
"dateReserved": "2005-12-04T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:36:24.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2004-2408 (GCVE-0-2004-2408)
Vulnerability from cvelistv5 – Published: 2005-08-18 04:00 – Updated: 2024-08-08 01:29
VLAI?
Summary
Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
Date Public ?
2004-07-03 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T01:29:12.538Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2004-07-03T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-10T14:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2004-2408",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux-vserver.org/ChangeLog",
"refsource": "MISC",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"name": "20040703 Linux Virtual Server/Secure Context procfs shared permissions flaw",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"name": "10660",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/10660"
},
{
"name": "12021",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/12021"
},
{
"name": "1010643",
"refsource": "SECTRACK",
"url": "http://securitytracker.com/id?1010643"
},
{
"name": "7480",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/7480"
},
{
"name": "linux-vserver-modify-permissions(16626)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2004-2408",
"datePublished": "2005-08-18T04:00:00.000Z",
"dateReserved": "2005-08-18T00:00:00.000Z",
"dateUpdated": "2024-08-08T01:29:12.538Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2005-0178 (GCVE-0-2005-0178)
Vulnerability from cvelistv5 – Published: 2005-02-16 05:00 – Updated: 2024-08-07 21:05
VLAI?
Summary
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
Date Public ?
2005-02-15 00:00
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T21:05:25.299Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA",
"x_transferred"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2005-02-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"tags": [
"vendor-advisory",
"x_refsource_CONECTIVA"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2005-0178",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://linux.bkbits.net:8080/linux-2.6/cset@41ddda70CWJb5nNL71T4MOlG2sMG8A",
"refsource": "CONFIRM",
"url": "http://linux.bkbits.net:8080/linux-2.6/cset@41ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"name": "oval:org.mitre.oval:def:10647",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"name": "12598",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/12598"
},
{
"name": "RHSA-2005:092",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"name": "20050215 [USN-82-1] Linux kernel vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"name": "CLA-2005:930",
"refsource": "CONECTIVA",
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2005-0178",
"datePublished": "2005-02-16T05:00:00.000Z",
"dateReserved": "2005-01-28T00:00:00.000Z",
"dateUpdated": "2024-08-07T21:05:25.299Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2005-0178
Vulnerability from fkie_nvd - Published: 2005-03-07 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:netkit:linux_netkit:0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "965ABB1F-BCD2-40F9-8029-3FE6785875A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netkit:linux_netkit:0.17.17:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CBF543-23BC-4CFD-893E-8AD446239F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3A4697C1-A42F-4361-B551-1829CDA8BB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "986B4DA4-1C72-4BE1-9D41-0C1A6B908C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4A730470-F8A0-44A8-A228-935A7C8217D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "291CEFF8-B1B5-4124-962D-B328AC862DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E86CE0-63D7-4BAC-AA82-90966A6898D3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6909B816-6778-48A8-A828-CA0AC5484388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B988FF88-E782-4581-9E24-CDE7E1734258",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9C11B5-5D63-4D2B-AD9A-5E657A8E1D01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F24BEDA8-2D1D-4AA1-8806-02838FB4C323",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAAF0A4-F1B1-4597-B9C1-E7F277061BD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AE95DD29-6E5F-475B-BCB3-6F756C62FA16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "19A5A944-8CFC-40ED-96D1-842ECA7316B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F5BF38E2-7353-4A55-ABA3-84085BB5F8CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "8C5C94F0-2390-4AF3-BE18-D00B10A67052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.9.9:*:*:*:*:*:*:*",
"matchCriteriaId": "E18C6032-012A-4B09-8D16-680CA3080D06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "134ED367-9610-485D-8935-3C46BFC073AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "C150050C-6C08-4434-848D-EB71741DF29E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "08D41FAC-B0CD-48DE-AA43-27487FF9E424",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BC9CC013-D4FB-4EC0-B405-6B79DF7C2F65",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "235B7E7D-3785-408A-AE53-7EB4F88F06C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "69A12556-5E7D-4832-A71A-66E6E9C2A710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9B296A-126A-42E3-B3DD-158F895A48EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "ACC75E5B-48A5-4C28-88B2-870C62DDA337",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C3D2EFF1-78E4-4002-8904-9DA13D7D1DF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "73E02E89-832D-44D9-B2EE-1C070E99AE9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3B55CD0D-0117-48F3-8643-4C191716AE20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "62BA4C24-FD29-421C-8F01-1798764C53F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "726B962B-D8B6-419E-BC0D-3DD9821234F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "985C2754-56B1-4638-B51E-313F7B8BA65F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "746D0402-66BD-4225-B847-6762BC4DC18E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "E657F58A-440D-40CB-97BF-ACB72AB36A3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "CF5E6A99-20FD-456C-A5E2-FEBA5DD672ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7699FD2E-C211-4E7E-BCA5-B991FBA90EDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "F93B921F-B152-49F3-9AAD-9421F5867F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "46381F67-EC99-4EA7-9599-BD4A25827E9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "29AC849E-7D4E-4C00-8BD0-672F413A80B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "6996F1F1-5374-4BD2-B421-ABB15C7C0B49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "87E18AFD-5090-4C1F-A2EE-A32A28DB5182",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "FC91B71A-2456-4410-9633-CF5870027D96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "92555500-16EB-4F76-B2C7-61A00A1AC722",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "541B4ED8-E970-4C67-B5AF-7DE5B7F754D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "1E55F8A8-1ABD-4760-9074-353BBAEE005B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "F873503F-C6E2-4AC2-859E-9431FE0FA0A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "39E849AC-B85A-4C4F-878B-E95A5F661E1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5E4A2912-12AC-4DF1-8023-A0B7DBE9A866",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"matchCriteriaId": "15004105-9A55-4592-96D6-3FF539EC7513",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "146F7A77-A950-4CAD-BDA9-C239696F569D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "70DCE8FF-40C3-44F7-8185-0422ADDA051B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7DAC3A7C-2092-46D4-908B-CF03F4217112",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DE77B8D6-EF2A-4EC2-AF75-B6FA48747781",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5A6F3945-21ED-44C6-86D2-B7755A87014E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A5DDB008-E88E-473C-B030-AF9B6F5E4E48",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0EEF4480-D50B-464C-AE39-A12455DBC99F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "15928E10-7D41-45B2-87D6-8AA10190A8EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C18E13C4-F42D-4168-B25E-544E1549C46B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"matchCriteriaId": "1C4B2ABB-0283-4532-9E29-B37BFF5FDFB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"matchCriteriaId": "C4DADA29-DCD3-44C4-9BDB-B881D6FCE3A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"matchCriteriaId": "4BD794C6-11F5-4A2B-9A3C-E03069A1526B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "C4947CDE-CB89-456B-8B5F-0E17B46BC893",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF701E58-35E8-4DDE-B832-C5A23E61A3CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2498D898-D243-4D0C-9AEF-0138D19A68B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "3924060B-1EC1-4003-B306-E327634E7797",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*",
"matchCriteriaId": "D45B43DF-FD4C-4C37-9569-1CCE450B8987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*",
"matchCriteriaId": "99879B2B-7FFB-4181-8928-13B7E17F36C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.25:*:*:*:*:*:*:*",
"matchCriteriaId": "83A3E250-5BC6-4AD3-A3DE-7F876FD90BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.2.27:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B10DC6E8-1A85-4F3B-88C9-0425782010A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC74D465-3256-4D87-8F47-C4D7CEA6E2D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:*:*:*:*:*:*:*",
"matchCriteriaId": "4817429F-B24F-47E3-BB3B-7EF9036D5F93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre1:*:*:*:*:*:*",
"matchCriteriaId": "1760ADC9-78A1-4133-9720-5319A4CF1DBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*",
"matchCriteriaId": "28ECE0D4-624D-4804-8013-DBA9BAF659ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre3:*:*:*:*:*:*",
"matchCriteriaId": "3C115333-E386-4B4D-91C6-69ECE55666F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre4:*:*:*:*:*:*",
"matchCriteriaId": "C5D62621-2C12-40F0-8726-E48926E4DA44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre5:*:*:*:*:*:*",
"matchCriteriaId": "614F1C35-94B2-4A86-AEB4-55C774445E2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre6:*:*:*:*:*:*",
"matchCriteriaId": "ECDD69D6-F79F-4F0E-BA3D-E721A1885A3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.3.99:pre7:*:*:*:*:*:*",
"matchCriteriaId": "ABCD388A-1E43-492E-8EEC-4E14EDD7AB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*",
"matchCriteriaId": "2E244C37-E366-482E-9173-9376D0839839",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*",
"matchCriteriaId": "11F96BB9-6509-4F1E-9590-E55EE8C6F992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*",
"matchCriteriaId": "AFAEE304-B9D4-4F1E-A2E0-9E5A4932096D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*",
"matchCriteriaId": "12375EA9-EBFF-40B6-BCBC-E34BC3A6CDA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*",
"matchCriteriaId": "718D4631-440E-4783-8966-B2A2D3EF89B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*",
"matchCriteriaId": "6111EDDB-065F-4AD1-925C-E0A3C1DE26AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*",
"matchCriteriaId": "A8A2F7E7-0C51-43F2-BCEA-01FF738971D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*",
"matchCriteriaId": "40F5FFBB-05C8-4D65-9FCF-11E67BEE86AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*",
"matchCriteriaId": "7015F57A-1E3B-42D2-9D12-F695078EFB21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*",
"matchCriteriaId": "467721EE-5130-46C5-BBB7-0F4878F3F171",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*",
"matchCriteriaId": "171257E7-12C5-4283-88F7-FFE643995563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*",
"matchCriteriaId": "0887E02F-9F36-41F0-9F75-060B8414D7BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*",
"matchCriteriaId": "74F962BE-2187-4C8F-BAE7-EFA3D79FCB8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*",
"matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*",
"matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*",
"matchCriteriaId": "D77F8919-4064-4EA5-A948-76178EA21F83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*",
"matchCriteriaId": "5E7C423D-23DE-4C7B-A518-66F87E041925",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*",
"matchCriteriaId": "8EA1382E-71B0-4E65-A310-716A244F4FB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*",
"matchCriteriaId": "AC955BD8-3ABB-4FDB-B37E-B1F0C47A5E0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*",
"matchCriteriaId": "2EBCA878-CCD0-4645-ACF6-12FB9C4B4A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*",
"matchCriteriaId": "B4BEF62D-2BEF-4CF8-9559-8A6D9631B0EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*",
"matchCriteriaId": "824BBD31-8F3B-4F05-981B-ABF662BBF5F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*",
"matchCriteriaId": "10F4CCC2-8AE5-4CFF-8DC4-126F02126E1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*",
"matchCriteriaId": "388A5C99-1F60-4C20-9AE5-6E73E5A3F819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*",
"matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*",
"matchCriteriaId": "5888F8D7-15C2-4435-BB3C-8674DFAF0089",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*",
"matchCriteriaId": "29439AD0-EB8D-4675-A77A-6548FF27ADA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*",
"matchCriteriaId": "F27AADF6-1605-47FC-8C4D-87827A578A90",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*",
"matchCriteriaId": "B42F4080-A76F-4D17-85E2-CD2D2E4D0450",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*",
"matchCriteriaId": "6968EF1D-7CC5-430D-866D-206F66486F63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*",
"matchCriteriaId": "50E6F5C5-BF74-4C10-830A-F232D528D290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*",
"matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*",
"matchCriteriaId": "A399D94B-D08D-4454-A07A-6634C9AE612F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*",
"matchCriteriaId": "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*",
"matchCriteriaId": "DCD8E4AE-FEF7-4CE2-B338-4F766921593F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*",
"matchCriteriaId": "13A8B50A-73F6-4FCF-A81F-FB624FBA7143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*",
"matchCriteriaId": "9336ABDF-9928-49F6-BAA7-D6E9829F9B1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*",
"matchCriteriaId": "E1D21AD5-C34F-4005-92F3-98F714DE98D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*",
"matchCriteriaId": "BB45C3B2-0F5D-4AE2-AE00-E1D6501E8D92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*",
"matchCriteriaId": "8D27D843-2DA7-4481-857C-09FDC4FBD45C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB93128-2743-4668-8C48-9B7282D4A672",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*",
"matchCriteriaId": "040991B8-FB4B-480B-B53B-AA7A884F9F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*",
"matchCriteriaId": "BFA592BC-5846-4FC1-B2A7-13E622705DA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*",
"matchCriteriaId": "59688C40-C92F-431E-ADD7-6782622862D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*",
"matchCriteriaId": "D813900D-DCF3-4F5D-9D90-13EDE2CBB3DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*",
"matchCriteriaId": "6E4C7831-0296-4DFA-A4E9-F7B6B30FFB72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*",
"matchCriteriaId": "C5FE15BF-91C7-452A-BE1B-7EC9632421C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*",
"matchCriteriaId": "15C1923C-D9C4-400D-9F0F-20B519EEC9C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*",
"matchCriteriaId": "E51913F9-FC7D-450A-9A82-5084AA74A5B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*",
"matchCriteriaId": "B62E02D5-9EEE-439B-A510-BEEE28A9F358",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*",
"matchCriteriaId": "02278C07-E649-427D-9E5C-F1738A01BCBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E120257D-346B-4BA6-A431-E6F820FBB5FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*",
"matchCriteriaId": "361D407D-A4BE-491D-BC8E-32E78DC4A8F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4F83D55B-3106-4907-A75F-A7EBF0EC6974",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0AFD594E-48BA-4281-8DEE-306E3008ABB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*",
"matchCriteriaId": "A3CD7983-4EB2-4D17-9332-493ECBADC284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*",
"matchCriteriaId": "AAB7E049-4B49-4FB5-815B-39CEAEDE6ACC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*",
"matchCriteriaId": "637A08D0-E382-4DE8-AEEC-6A53A72849B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*",
"matchCriteriaId": "2D3D2AA2-05B2-46E3-96EE-27EB29795E04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6F04081-D672-488E-A91D-5088DD04AA5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BDB59EF-74EF-462E-BC84-89201F734380",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0755A136-3DE3-4B61-B5EF-F6282AACD38E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B1531AD3-2525-4F6E-B77D-FE8863CBD3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "81D950C3-0DDC-4549-99F8-1E206768219A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7E2A5B-6CF3-4748-BE4F-F63A4E59CB64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "195A133A-26C9-401E-913F-285BA220D1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B8D68E21-6C58-46A7-96F2-9A79DD880803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1E975B63-3D9C-4FA9-A6D0-C9865FDA7AC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "38D11B12-AFD7-4055-A366-D932CA1BA8C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "BC990132-9DF2-4D23-B9DA-0819809A3CAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FFA51D40-E72C-40A4-B238-70F6806FA1B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1E1B7D68-E41E-4A5A-9606-F14F057B39E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.13:*:*:*:*:*:*:*",
"matchCriteriaId": "7799A9CE-1948-4D71-BADB-A4A7ECAFF5FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.14:*:*:*:*:*:*:*",
"matchCriteriaId": "70BCB10C-FD72-4F18-84C9-AE0603402426",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.15:*:*:*:*:*:*:*",
"matchCriteriaId": "54A74CAB-2BD1-48BC-BCEB-983E72B3C56D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.16:*:*:*:*:*:*:*",
"matchCriteriaId": "CF742FF1-5504-41BB-8FAA-D71B83C791B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.17:*:*:*:*:*:*:*",
"matchCriteriaId": "901C6D04-3226-4654-9A41-0325B48A2F7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.18:*:*:*:*:*:*:*",
"matchCriteriaId": "072A77AD-BB27-4C24-91A0-A12D6E741593",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.19:*:*:*:*:*:*:*",
"matchCriteriaId": "BF900D1D-E351-4407-8269-80E5403432B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.20:*:*:*:*:*:*:*",
"matchCriteriaId": "44915F9F-88DF-4304-8F66-58A869654BDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.21:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC2D90D-2115-406C-B609-870B241F00B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.22:*:*:*:*:*:*:*",
"matchCriteriaId": "EF681CC1-B3EC-467A-A10D-10840D3D4575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8660C030-328E-4221-847E-AC4BDA08CE79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.24:*:*:*:*:*:*:*",
"matchCriteriaId": "0EE83E4E-DBA6-47EB-80FF-9A41A2978DDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.25:*:*:*:*:*:*:*",
"matchCriteriaId": "B58DE3A3-2BE0-45E3-8EFD-5A4439EAD6DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.26:*:*:*:*:*:*:*",
"matchCriteriaId": "47AEC277-F9A4-412F-B2EA-C1AEA336A46C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.27:*:*:*:*:*:*:*",
"matchCriteriaId": "7234AF29-BCDA-4728-A141-C169EE59CEC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.28:*:*:*:*:*:*:*",
"matchCriteriaId": "E7D9064F-466F-4D66-AD5E-8BC2D31CD80D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.29:*:*:*:*:*:*:*",
"matchCriteriaId": "374851C5-C61D-4964-8B4A-473B0A008F11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.30:*:*:*:*:*:*:*",
"matchCriteriaId": "1FD55C81-3687-46BF-880E-58D7E005A185",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.31:*:*:*:*:*:*:*",
"matchCriteriaId": "2953267F-16BF-404F-83F1-73E0908979B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.32:*:*:*:*:*:*:*",
"matchCriteriaId": "9D953B61-3457-4A0E-A668-BA4937B79784",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.33:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5F3607-C0DD-494C-AB6E-46E383A6B17D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.34:*:*:*:*:*:*:*",
"matchCriteriaId": "19138F52-25EA-42B6-89DC-692A8AF0A720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.35:*:*:*:*:*:*:*",
"matchCriteriaId": "4C2EBADC-0817-4E38-9F49-8446D8A20CDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.36:*:*:*:*:*:*:*",
"matchCriteriaId": "340368E7-0005-4F8A-8AF1-C20A1198288C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.37:*:*:*:*:*:*:*",
"matchCriteriaId": "0DC860DD-57DF-4474-AE2B-9AADB9060175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.38:*:*:*:*:*:*:*",
"matchCriteriaId": "DC1D576A-0763-4611-B3CF-CD8514F18783",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.39:*:*:*:*:*:*:*",
"matchCriteriaId": "4A61F3C5-EA3A-4AA2-8F4E-02E07864801F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.40:*:*:*:*:*:*:*",
"matchCriteriaId": "6F570226-CA89-46F4-8C68-9A59BC0602A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.41:*:*:*:*:*:*:*",
"matchCriteriaId": "162A88DA-E2EA-4E92-B174-9AD86BE8D983",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.42:*:*:*:*:*:*:*",
"matchCriteriaId": "EBE19B6B-9537-4C76-80B2-98DAF2C15B5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.43:*:*:*:*:*:*:*",
"matchCriteriaId": "5EE5C4F5-C64D-4714-B02E-689B435E3E5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.44:*:*:*:*:*:*:*",
"matchCriteriaId": "BE4F20D3-77E7-4FC2-AF18-6A5E3AE08615",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.45:*:*:*:*:*:*:*",
"matchCriteriaId": "164F4483-9F28-491A-8F99-4242C9B9CBD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.46:*:*:*:*:*:*:*",
"matchCriteriaId": "34803A7D-45C4-4DBE-BF18-19CE9DE62A96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.47:*:*:*:*:*:*:*",
"matchCriteriaId": "1178D6EE-A462-4CC1-B430-9A44C75D2336",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.48:*:*:*:*:*:*:*",
"matchCriteriaId": "4360530E-6E07-48F9-B8F8-B36622331052",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.49:*:*:*:*:*:*:*",
"matchCriteriaId": "17508D09-AE14-4458-93A2-E2764452EA8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.50:*:*:*:*:*:*:*",
"matchCriteriaId": "05F2CD4A-CCA9-4743-86C4-7675D2487E16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.51:*:*:*:*:*:*:*",
"matchCriteriaId": "75C1504C-03C5-49E4-8192-E1E698CF07A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.52:*:*:*:*:*:*:*",
"matchCriteriaId": "DB7CB4B0-1CF5-4AA7-A977-9C24AD6C486D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.53:*:*:*:*:*:*:*",
"matchCriteriaId": "37A3172A-E663-42F6-90E7-51C3850AF9E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.54:*:*:*:*:*:*:*",
"matchCriteriaId": "16F6692C-494F-44ED-97C6-A6CD05334DA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.55:*:*:*:*:*:*:*",
"matchCriteriaId": "3B61C93E-84FE-46CE-A7DD-ACFEFB96BB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.56:*:*:*:*:*:*:*",
"matchCriteriaId": "5E79FB38-5AE5-4ACD-B4F5-F533C0E1D503",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.57:*:*:*:*:*:*:*",
"matchCriteriaId": "77231F8B-137F-4FAE-BCD9-658F32943CBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.58:*:*:*:*:*:*:*",
"matchCriteriaId": "552ED77A-F09A-4923-A907-8E0DF8445363",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.59:*:*:*:*:*:*:*",
"matchCriteriaId": "CDD8EDD0-7817-4A5E-AE97-DA1941E859BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.60:*:*:*:*:*:*:*",
"matchCriteriaId": "5DF940EA-676A-42C8-A6E0-7F53C8A34340",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.61:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC8FDE8-DB5A-4B2D-810D-73E91194E00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.62:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF7304E-AAA9-4BC3-AEF0-C9509E95ECA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.63:*:*:*:*:*:*:*",
"matchCriteriaId": "29DCCFB1-054F-4BF0-92F1-78A2063415D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.64:*:*:*:*:*:*:*",
"matchCriteriaId": "D3D3222C-7469-42F6-984D-3223BCD8080E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.65:*:*:*:*:*:*:*",
"matchCriteriaId": "697B7069-D08D-41BD-8285-A1ABA0E1142F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.66:*:*:*:*:*:*:*",
"matchCriteriaId": "72173CFB-BAB6-456C-B5F2-3AA31D799E74",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.67:*:*:*:*:*:*:*",
"matchCriteriaId": "FDD08A67-195F-431B-98A5-42B2966055DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.68:*:*:*:*:*:*:*",
"matchCriteriaId": "658C7317-D50B-475A-9E0E-E68AECD49B5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.5.69:*:*:*:*:*:*:*",
"matchCriteriaId": "1270F454-8E05-413C-BAF4-35D062CA5803",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"matchCriteriaId": "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"matchCriteriaId": "2255842B-34CD-4062-886C-37161A065703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"matchCriteriaId": "F0ED322D-004C-472E-A37F-89B78C55FE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"matchCriteriaId": "412F7334-C46B-4F61-B38A-2CA56B498151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"matchCriteriaId": "5967AF83-798D-4B1E-882A-5737FFC859C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"matchCriteriaId": "A90D2123-D55B-4104-8D82-5B6365AA3B77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"matchCriteriaId": "DCCDFD49-D402-420E-92F5-20445A0FE139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"matchCriteriaId": "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"matchCriteriaId": "8877D178-1655-46E9-8F5A-2DD576601F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"matchCriteriaId": "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"matchCriteriaId": "8358E965-3689-4B05-8470-C4A1463FA0E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2C14A949-E2B8-4100-8ED4-645CB996B08A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A0934C49-5F88-4189-BD88-2F32C39C2F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "14B0A230-4054-4483-A3A7-9A5A286C7552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2422569B-02ED-4028-83D8-D778657596B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E66E4653-1A55-4827-888B-E0776E32ED28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
"matchCriteriaId": "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores."
}
],
"id": "CVE-2005-0178",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 1.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2005-03-07T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
},
{
"source": "cve@mitre.org",
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"source": "cve@mitre.org",
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/12598"
},
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000930"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://linux.bkbits.net:8080/linux-2.6/cset%4041ddda70CWJb5nNL71T4MOlG2sMG8A"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=full-disclosure\u0026m=110846102231365\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://www.redhat.com/support/errata/RHSA-2005-092.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/12598"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10647"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-2613
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| vserver | linux-vserver | 1.3.0 | |
| vserver | linux-vserver | 1.3.1 | |
| vserver | linux-vserver | 1.3.2 | |
| vserver | linux-vserver | 1.3.3 | |
| vserver | linux-vserver | 1.3.4 | |
| vserver | linux-vserver | 1.20 | |
| vserver | linux-vserver | 1.21 | |
| vserver | linux-vserver | 1.22 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4E0322-CB40-4F6A-AC8D-65E88D4DCB6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "611D1000-D652-4A4E-B586-AA86CFE46037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "659AADB3-F844-4862-9AD4-93606EE87A06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B191BAB9-5A4B-44CF-B621-36A812827E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1492C2F9-FDB8-46C6-AC31-A08DF3346690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3A4697C1-A42F-4361-B551-1829CDA8BB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "986B4DA4-1C72-4BE1-9D41-0C1A6B908C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4A730470-F8A0-44A8-A228-935A7C8217D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to \"write access to specific proc entries from a vserver context\", a different vulnerability than CVE-2004-2408."
}
],
"id": "CVE-2004-2613",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.osvdb.org/7586"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05824.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Patch"
],
"url": "http://www.osvdb.org/7586"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2004-2408
Vulnerability from fkie_nvd - Published: 2004-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| vserver | linux-vserver | 1.3.0 | |
| vserver | linux-vserver | 1.3.1 | |
| vserver | linux-vserver | 1.3.2 | |
| vserver | linux-vserver | 1.3.3 | |
| vserver | linux-vserver | 1.3.4 | |
| vserver | linux-vserver | 1.3.5 | |
| vserver | linux-vserver | 1.3.6 | |
| vserver | linux-vserver | 1.3.7 | |
| vserver | linux-vserver | 1.3.8 | |
| vserver | linux-vserver | 1.3.9 | |
| vserver | linux-vserver | 1.9.1 | |
| vserver | linux-vserver | 1.20 | |
| vserver | linux-vserver | 1.21 | |
| vserver | linux-vserver | 1.22 | |
| vserver | linux-vserver | 1.23 | |
| vserver | linux-vserver | 1.24 | |
| vserver | linux-vserver | 1.25 | |
| vserver | linux-vserver | 1.26 | |
| vserver | linux-vserver | 1.27 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC4E0322-CB40-4F6A-AC8D-65E88D4DCB6F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "611D1000-D652-4A4E-B586-AA86CFE46037",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "659AADB3-F844-4862-9AD4-93606EE87A06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B191BAB9-5A4B-44CF-B621-36A812827E5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1492C2F9-FDB8-46C6-AC31-A08DF3346690",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3582FBC3-48A0-4634-A834-F57639FF0AA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "9DB2AD0E-4F6B-4495-A8E6-64738D8CD80C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "68AFFD5E-55AA-46E0-A7DD-5E55B3AB625B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1BF8CDFC-415E-486A-89CC-F282E3E737EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "210A080B-1DD1-4F80-93EE-76E84BBE4F17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4546690D-3390-4867-A27E-B36CC0DEA3F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "3A4697C1-A42F-4361-B551-1829CDA8BB3E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "986B4DA4-1C72-4BE1-9D41-0C1A6B908C0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4A730470-F8A0-44A8-A228-935A7C8217D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "291CEFF8-B1B5-4124-962D-B328AC862DF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "D2E86CE0-63D7-4BAC-AA82-90966A6898D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "2085842D-8782-4D6E-BEA4-84798FFEE00B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "904F270B-D19C-4E2F-BE8F-D36CBAA3F3B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "A2E6C095-E770-4D66-A670-BE68FFA65E71",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server."
}
],
"id": "CVE-2004-2408",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2004-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"source": "cve@mitre.org",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/12021"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/7480"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2004-07/0040.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/12021"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://securitytracker.com/id?1010643"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/7480"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/10660"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16626"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2003-1288
Vulnerability from fkie_nvd - Published: 2003-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| vserver | linux-vserver | 1.22 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vserver:linux-vserver:1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "4A730470-F8A0-44A8-A228-935A7C8217D2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions."
}
],
"id": "CVE-2003-1288",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2003-12-31T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "cve@mitre.org",
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"source": "cve@mitre.org",
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/7587"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://linux-vserver.org/ChangeLog"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://list.linux-vserver.org/archive/vserver/msg05630.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
],
"url": "http://list.linux-vserver.org/archive/vserver/msg05631.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://list.linux-vserver.org/archive/vserver/msg05658.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.osvdb.org/7587"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}