LOW · 2.1

CVE-2002-2254

The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may a...

Vulnerability Description

The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.

CVSS Score

2.1

LOW

AV:L/AC:L/Au:N/C:N/I:P/A:N
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE

Affected Products

VendorProductVersions
LinuxLinux Kernel2.4.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2002-2254?

CVE-2002-2254 is a vulnerability with a CVSS score of 2.1 (LOW). The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may a...

How severe is CVE-2002-2254?

CVE-2002-2254 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2002-2254?

Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.