Show filters
6 Total Results
Displaying 1-6 of 6
Sort by:
Attacker Value
Unknown
CVE-2006-4243
Disclosure Date: November 06, 2019 (last updated November 27, 2024)
linux vserver 2.6 before 2.6.17 suffers from privilege escalation in remount code.
0
Attacker Value
Unknown
CVE-2005-4347
Disclosure Date: December 31, 2005 (last updated February 22, 2025)
The Linux 2.4 kernel patch in kernel-patch-vserver before 1.9.5.5 and 2.x before 2.3 for Debian GNU/Linux does not correctly set the "chroot barrier" with util-vserver, which allows attackers to access files on the host system that are outside of the vserver.
0
Attacker Value
Unknown
CVE-2005-0178
Disclosure Date: March 07, 2005 (last updated February 22, 2025)
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores.
0
Attacker Value
Unknown
CVE-2004-2408
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Linux VServer 1.27 and earlier, 1.3.9 and earlier, and 1.9.1 and earlier shares /proc permissions across all virtual and host servers, which allows local users with the ability to set permissions in /proc to obtain system information or cause a denial of service on other virtual servers or the host server.
0
Attacker Value
Unknown
CVE-2004-2613
Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Unspecified vulnerability in procfs in the Linux-VServer stable branch for the 2.4 kernel before 1.23 and Linux-VServer development branch for the 2.4 kernel before 1.3.5 has unspecified impact and attack vectors, related to "write access to specific proc entries from a vserver context", a different vulnerability than CVE-2004-2408.
0
Attacker Value
Unknown
CVE-2003-1288
Disclosure Date: December 31, 2003 (last updated February 22, 2025)
Multiple race conditions in Linux-VServer 1.22 with Linux kernel 2.4.23 and SMP allow local users to cause a denial of service (kernel oops) via unknown attack vectors related to the (1) s_info and (2) ip_info data structures and the (a) forget_original_parent, (b) goodness, (c) schedule, (d) update_process_times, and (e) vc_new_s_context functions.
0