Description
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.
Products
- Linux Kernel 2.4.0
- Linux Kernel 2.4.0
- Linux Kernel 2.4.0 test10
- Linux Kernel 2.4.0 test11
- Linux Kernel 2.4.0 test12
- Linux Kernel 2.4.0 test1
- Linux Kernel 2.4.0 test2
- Linux Kernel 2.4.0 test3
- Linux Kernel 2.4.0 test4
- Linux Kernel 2.4.0 test5
- Linux Kernel 2.4.0 test6
- Linux Kernel 2.4.0 test7
- Linux Kernel 2.4.0 test8
- Linux Kernel 2.4.0 test9
- Linux Kernel 2.4.10
- Linux Kernel 2.4.11
- Linux Kernel 2.4.11
- Linux Kernel 2.4.11 pre3
- Linux Kernel 2.4.12
- Linux Kernel 2.4.13
- Linux Kernel 2.4.14
- Linux Kernel 2.4.15
- Linux Kernel 2.4.16
- Linux Kernel 2.4.17
- Linux Kernel 2.4.18
- Linux Kernel 2.4.18
- Linux Kernel 2.4.18 pre1
- Linux Kernel 2.4.18 pre2
- Linux Kernel 2.4.18 pre3
- Linux Kernel 2.4.18 pre4
- Linux Kernel 2.4.18 pre5
- Linux Kernel 2.4.18 pre6
- Linux Kernel 2.4.18 pre7
- Linux Kernel 2.4.18 pre8
- Linux Kernel 2.4.18 pre9
- Linux Kernel 2.4.19
- Linux Kernel 2.4.19
- Linux Kernel 2.4.19 pre1
- Linux Kernel 2.4.19 pre2
- Linux Kernel 2.4.19 pre3
- Linux Kernel 2.4.19 pre4
- Linux Kernel 2.4.19 pre5
- Linux Kernel 2.4.19 pre6
- Linux Kernel 2.4.1
- Linux Kernel 2.5.0
- Linux Kernel 2.5.10
- Linux Kernel 2.5.11
- Linux Kernel 2.5.12
- Linux Kernel 2.5.13
- Linux Kernel 2.5.14
- Linux Kernel 2.5.15
- Linux Kernel 2.5.16
- Linux Kernel 2.5.17
- Linux Kernel 2.5.18
- Linux Kernel 2.5.19
- Linux Kernel 2.5.1
- Linux Kernel 2.5.20
- Linux Kernel 2.5.21
- Linux Kernel 2.5.22
- Linux Kernel 2.5.23
- Linux Kernel 2.5.24
- Linux Kernel 2.5.25
- Linux Kernel 2.5.26
- Linux Kernel 2.5.27
- Linux Kernel 2.5.28
- Linux Kernel 2.5.29
- Linux Kernel 2.5.2
- Linux Kernel 2.5.30
- Linux Kernel 2.5.31
- Linux Kernel 2.5.3
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2002-2254, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2002-2254 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References