OVAL Definitions - Family: unix

Filter: Compliance Inventory Patch Vulnerability All
Title Definition Id Class Family
Race condition in Squid 2.5.STABLE7 to 2.5.STABLE9, when using the Netscape Set-Cookie recommendations for handling cook... oval:org.mitre.oval:def:11169 Vulnerability unix
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 befor... oval:org.mitre.oval:def:11117 Vulnerability unix
Race condition in the rmtree function in File::Path 1.08 and 2.07 (lib/File/Path.pm) in Perl 5.8.8 and 5.10.0 allows loc... oval:org.mitre.oval:def:11076 Vulnerability unix
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link at... oval:org.mitre.oval:def:10902 Vulnerability unix
Race condition in the ptrace and utrace support in the Linux kernel 2.6.9 through 2.6.25, as used in Red Hat Enterprise ... oval:org.mitre.oval:def:10749 Vulnerability unix
Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) an... oval:org.mitre.oval:def:10647 Vulnerability unix
Race condition in the JavaScript garbage collection in Mozilla Firefox 1.5 before 1.5.0.5, Thunderbird before 1.5.0.5, a... oval:org.mitre.oval:def:10635 Vulnerability unix
Race condition in the NPObjWrapper_NewResolve function in modules/plugin/base/src/nsJSNPRuntime.cpp in xul.dll in Mozill... oval:org.mitre.oval:def:10628 Vulnerability unix
Race condition in nss_ldap, when used in applications that are linked against the pthread library and fork after a call ... oval:org.mitre.oval:def:10625 Vulnerability unix
Race condition in the safe_open function in the Mutt mail client 1.5.12 and earlier, when creating temporary files in an... oval:org.mitre.oval:def:10601 Vulnerability unix
Race condition in the rmtree function in File::Path.pm in Perl before 5.8.4 allows local users to create arbitrary setui... oval:org.mitre.oval:def:10475 Vulnerability unix
Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbit... oval:org.mitre.oval:def:10431 Vulnerability unix
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still... oval:org.mitre.oval:def:10427 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:10425 Vulnerability unix
Race condition in the rmtree function in the File::Path module in Perl 5.6.1 and 5.8.4 sets read/write permissions for t... oval:org.mitre.oval:def:10404 Vulnerability unix
Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.4... oval:org.mitre.oval:def:10322 Vulnerability unix
Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMI... oval:org.mitre.oval:def:10309 Vulnerability unix
Race condition in gzip 1.2.4, 1.3.3, and earlier, when decompressing a gzipped file, allows local users to modify permis... oval:org.mitre.oval:def:10242 Vulnerability unix
Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versio... oval:org.mitre.oval:def:10111 Vulnerability unix
Race condition in daemon/slave.c in gdm before 2.14.1 allows local users to gain privileges via a symlink attack when gd... oval:org.mitre.oval:def:10092 Vulnerability unix
Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SE... oval:org.mitre.oval:def:10060 Vulnerability unix
Race condition in the ssl3_read_bytes function in s3_pkt.c in oval:org.mitre.oval:def:24638 Vulnerability unix
Racoon before 20040408a allows remote attackers to cause a denial of service (memory consumption) via an ISAKMP packet w... oval:org.mitre.oval:def:11220 Vulnerability unix
Racoon Denial of Service via Large Length Field oval:org.mitre.oval:def:984 Vulnerability unix
Racoon IKE Daemon Unauthorized X.509 Certificate Connection Vulnerability oval:org.mitre.oval:def:945 Vulnerability unix
racoon/isakmp_frag.c in ipsec-tools before 0.7.2 allows remote attackers to cause a denial of service (crash) via crafte... oval:org.mitre.oval:def:9624 Vulnerability unix
rad_decode in FreeRADIUS 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a short RADI... oval:org.mitre.oval:def:10917 Vulnerability unix
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block dev... oval:org.mitre.oval:def:10264 Vulnerability unix
rdesktop 1.3.1 with xscreensaver 4.14, and possibly other versions, when running on Fedora and possibly other platforms,... oval:org.mitre.oval:def:10096 Vulnerability unix
Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which cou... oval:org.mitre.oval:def:9406 Vulnerability unix

OVAL Definitions By Referenced Objects

How does it work?   User agreement and privacy statement   About & Contact
CVE is a registred trademark of the MITRE Corporation and the authoritive source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritive source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritive source of OVAL content is MITRE's OVAL web site.
Warning: This site and all data are provided as is. It is not guaranteed that all information is accurate and complete. Use any information provided on this site at your own risk. By using this site you accept that you know that these data are provided as is and not guaranteed to be accurate, correct or complete. All trademarks appearing on this site are the property of their respective owners in the US or other countries. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss. PLEASE SEE nvd.nist.gov and oval.mitre.org for more details about OVAL language and definitions.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor/web site owner/maintainer be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
Use of OVAL and all related data is subject to terms of use defined by Mitre at http://oval.mitre.org/oval/about/termsofuse.html