Vulnerabilities > Linux > Linux Kernel > 2.2.19
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2002-12-31 | CVE-2002-1976 | Unspecified vulnerability in Linux Kernel ifconfig, when used on the Linux kernel 2.2 and later, does not report when the network interface is in promiscuous mode if it was put in promiscuous mode using PACKET_MR_PROMISC, which could allow attackers to sniff the network without detection, as demonstrated using libpcap. | 2.1 |
2002-12-23 | CVE-2002-1380 | Local Denial of Service vulnerability in Linux Kernel 2.2 mmap() Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface. | 2.1 |
2002-12-11 | CVE-2002-1319 | Denial Of Service vulnerability in Linux Kernel 2.4 System Call TF Flag The Linux kernel 2.4.20 and earlier, and 2.5.x, when running on x86 systems, allows local users to cause a denial of service (hang) via the emulation mode, which does not properly clear TF and NT EFLAGs. | 2.1 |
2002-08-12 | CVE-2002-0499 | Unspecified vulnerability in Linux Kernel The d_path function in Linux kernel 2.2.20 and earlier, and 2.4.18 and earlier, truncates long pathnames without generating an error, which could allow local users to force programs to perform inappropriate operations on the wrong directories. | 2.1 |
2002-07-03 | CVE-2002-0570 | Unspecified vulnerability in Linux Kernel The encrypted loop device in Linux kernel 2.4.10 and earlier does not authenticate the entity that is encrypting data, which allows local users to modify encrypted data without knowing the key. | 2.1 |
2001-12-31 | CVE-2001-1551 | Local Security vulnerability in Linux Kernel 2.2.19 Linux kernel 2.2.19 enables CAP_SYS_RESOURCE for setuid processes, which allows local users to exceed disk quota restrictions during execution of setuid programs. | 2.1 |
2001-10-18 | CVE-2001-1384 | Unspecified vulnerability in Linux Kernel ptrace in Linux 2.2.x through 2.2.19, and 2.4.x through 2.4.9, allows local users to gain root privileges by running ptrace on a setuid or setgid program that itself calls an unprivileged program, such as newgrp. | 7.2 |
2001-10-18 | CVE-2001-0907 | Denial of Service vulnerability in Linux Deep Symbolic Link Linux kernel 2.2.1 through 2.2.19, and 2.4.1 through 2.4.10, allows local users to cause a denial of service via a series of deeply nested symlinks, which causes the kernel to spend extra time when trying to access the link. | 2.1 |
2001-04-17 | CVE-2001-1400 | Denial-Of-Service vulnerability in kernel Unknown vulnerabilities in the UDP port allocation for Linux kernel before 2.2.19 could allow local users to cause a denial of service (deadlock). | 2.1 |
2001-04-17 | CVE-2001-1399 | Local Security vulnerability in kernel Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86." | 2.1 |