Description
The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall).
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-311-1 | New kernel packages fix several vulnerabilities |
Debian DSA |
DSA-312-1 | New powerpc kernel fixes several vulnerabilities |
Debian DSA |
DSA-332-1 | New Linux 2.4.17 source code and MIPS kernel images fix several vulnerabilities |
Debian DSA |
DSA-336-1 | New Linux 2.2.20 packages and i386 kernel images fix several vulnerabilities |
Debian DSA |
DSA-336-2 | Factual correction for DSA-336-1 |
Debian DSA |
DSA-442-1 | New Linux 2.4.17 packages fix local root exploits and more (s390) |
EUVD |
EUVD-2002-0426 | The iBCS routines in arch/i386/kernel/traps.c for Linux kernels 2.4.18 and earlier on x86 systems allow local users to kill arbitrary processes via a a binary compatibility interface (lcall). |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T02:49:28.453Z
Reserved: 2002-06-07T00:00:00.000Z
Link: CVE-2002-0429
No data.
Status : Modified
Published: 2002-08-12T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2002-0429
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD