CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4199 | CVE-2001-1396 | Candidate | Unknown vulnerabilities in strnlen_user for Linux kernel before 2.2.19, with unknown impact. | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-strnlen-user(11167) | View |
4200 | CVE-2001-1397 | Candidate | The System V (SYS5) shared memory implementation for Linux kernel before 2.2.19 could allow attackers to modify recently freed memory. | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-sys5-shm(11168) | View |
5224 | CVE-2002-0834 | Candidate | Buffer overflow in the ISIS dissector for Ethereal 0.9.5 and earlier allows remote attackers to cause a denial of service or execute arbitrary code via malformed packets. | Proposed (20020830) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Foat | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> BUGTRAQ:20020830 GLSA: ethereal | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103072249023973&w=2 | Christey> DEBIAN:DSA-162 | URL:http://www.debian.org/security/2002/dsa-162 | Christey> XF:ethereal-isis-dissector-bo(9942) | URL:http://www.iss.net/security_center/static/9942.php | Frech> XF:ethereal-isis-dissector-bo(9942) | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html | View |
4201 | CVE-2001-1398 | Candidate | Masquerading code for Linux kernel before 2.2.19 does not fully check packet lengths in certain cases, which may lead to a vulnerability. | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-masquerade-packet-bo(11169) | View |
4202 | CVE-2001-1399 | Candidate | Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86." | Proposed (20020830) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | MODIFY(1) Frech | NOOP(1) Foat | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | Frech> XF:linux-x86-asm-copy(11170) | View |
Page 20882 of 20943, showing 5 records out of 104715 total, starting on record 104406, ending on 104410