Slackware Linux Slackware Linux

Do you want an email whenever new security vulnerabilities are reported in Slackware Linux?

By the Year

In 2023 there have been 0 vulnerabilities in Slackware Linux . Slackware Linux did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2023 0 0.00
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 2 7.65

It may take a day or so for new Slackware Linux vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Slackware Linux Security Vulnerabilities

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6

CVE-2018-9336 7.8 - High - May 01, 2018

openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation.

Double-free

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which

CVE-2018-7184 7.5 - High - March 06, 2018

ntpd in ntp 4.2.8p4 before 4.2.8p11 drops bad packets before updating the "received" timestamp, which allows remote attackers to cause a denial of service (disruption) by sending a packet with a zero-origin timestamp causing the association to reset and setting the contents of the packet as the most recent timestamp. This issue is a result of an incomplete fix for CVE-2015-7704.

Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents

CVE-2004-0940 - February 09, 2005

Buffer overflow in the get_tag function in mod_include for Apache 1.3.x to 1.3.32 allows local users who can create SSI documents to execute arbitrary code as the apache user via SSI (XSSI) documents that trigger a length calculation error.

Buffer Overflow

login in Slackware 7.0

CVE-1999-0856 - December 01, 1999

login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist.

XFree86 startx command is vulnerable to a symlink attack

CVE-1999-0433 - March 21, 1999

XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a

CVE-1999-0368 - February 09, 1999

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.

Buffer overflow in the Linux mail program "deliver"

CVE-1999-0341 - January 01, 1998

Buffer overflow in the Linux mail program "deliver" allows local users to gain root access.

Buffer overflow in Linux Slackware crond program

CVE-1999-0340 - December 01, 1997

Buffer overflow in Linux Slackware crond program allows local users to gain root access.

Buffer overflow in telnet daemon tgetent routing

CVE-1999-0192 - October 18, 1997

Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.

Buffer overflow in NLS (Natural Language Service).

CVE-1999-0041 - February 13, 1997

Buffer overflow in NLS (Natural Language Service).

Race condition in Linux mailx command

CVE-1999-0123 - December 01, 1995

Race condition in Linux mailx command allows local users to read user files.

Remote attackers can access mail files via POP3 in some Linux systems

CVE-1999-0242 - March 01, 1995

Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Slackware Linux or by Slackware? Click the Watch button to subscribe.

Slackware
Vendor

subscribe