Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Linux
(Conectiva)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 63 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2004-09-16 | CVE-2004-0801 | Unknown vulnerability in foomatic-rip in Foomatic before 3.0.2 allows local users or remote attackers with access to CUPS to execute arbitrary commands. | Linux, Foomatic\-Filters, Java_desktop_system, Secure_linux | N/A | ||
2004-12-06 | CVE-2004-0626 | The tcp_find_option function of the netfilter subsystem in Linux kernel 2.6, when using iptables and TCP options rules, allows remote attackers to cause a denial of service (CPU consumption by infinite loop) via a large option length that produces a negative integer after a casting operation to the char type. | Linux, Linux, Linux_kernel, Suse_linux | N/A | ||
2004-08-06 | CVE-2004-0557 | Multiple buffer overflows in the st_wavstartread function in wav.c for Sound eXchange (SoX) 12.17.2 through 12.17.4 allow remote attackers to execute arbitrary code via certain WAV file header fields. | Linux, Linux, Enterprise_linux, Enterprise_linux_desktop, Fedora_core, Sox | N/A | ||
2004-08-06 | CVE-2004-0554 | Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. | Converged_communications_server, Intuity_audix, Modular_messaging_message_storage_server, S8300, S8500, S8700, Linux, Linux, Linux_kernel, Enterprise_linux, Suse_email_server, Suse_linux, Suse_linux_admin\-Cd_for_firewall, Suse_linux_connectivity_server, Suse_linux_database_server, Suse_linux_firewall_cd, Suse_linux_office_server, Suse_office_server | N/A | ||
2004-08-06 | CVE-2004-0535 | The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. | Linux, Secure_community, Secure_linux, Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Suse_email_server, Suse_linux, Suse_linux_admin\-Cd_for_firewall, Suse_linux_connectivity_server, Suse_linux_database_server, Suse_linux_firewall_cd, Suse_linux_firewall_live\-Cd, Suse_linux_office_server, Suse_office_server | N/A | ||
2004-12-06 | CVE-2004-0497 | Unknown vulnerability in Linux kernel 2.x may allow local users to modify the group ID of files, such as NFS exported files in kernel 2.4. | Linux, Linux, Linux_kernel, Mandrake_linux, Mandrake_linux_corporate_server, Mandrake_multi_network_firewall, Enterprise_linux, Suse_linux, Secure_linux | N/A | ||
2004-08-06 | CVE-2004-0495 | Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool. | Converged_communications_server, Intuity_audix, Modular_messaging_message_storage_server, S8300, S8500, S8700, Linux, Linux, Linux_kernel, Enterprise_linux, Suse_email_server, Suse_linux, Suse_linux_admin\-Cd_for_firewall, Suse_linux_connectivity_server, Suse_linux_database_server, Suse_linux_firewall_cd, Suse_linux_office_server, Suse_office_server | N/A | ||
2003-08-27 | CVE-2003-0540 | The address parser code in Postfix 1.1.12 and earlier allows remote attackers to cause a denial of service (lock) via (1) a malformed envelope address to a local host that would generate a bounce and contains the ".!" string in the MAIL FROM or Errors-To headers, which causes nqmgr to lock up, or (2) via a valid MAIL FROM with a RCPT TO containing a ".!" string, which causes an instance of the SMTP listener to lock up. | Linux, Postfix | N/A | ||
2003-08-27 | CVE-2003-0468 | Postfix 1.1.11 and earlier allows remote attackers to use Postfix to conduct "bounce scans" or DDos attacks of other hosts via an email address to the local host containing the target IP address and service name followed by a "!" string, which causes Postfix to attempt to use SMTP to communicate with the target on the associated port. | Linux, Postfix | N/A | ||
2001-07-19 | CVE-2001-1375 | tcl/tk package (tcltk) 8.3.1 searches for its libraries in the current working directory before other directories, which could allow local users to execute arbitrary code via a Trojan horse library that is under a user-controlled directory. | Linux, Linux | N/A |