Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown

CVE-2004-0685

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
0
Attacker Value
Unknown

CVE-2004-0658

Disclosure Date: August 06, 2004 (last updated February 22, 2025)
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.
0
Attacker Value
Unknown

CVE-2004-0109

Disclosure Date: June 01, 2004 (last updated February 22, 2025)
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
0
Attacker Value
Unknown

CVE-2004-2135

Disclosure Date: May 26, 2004 (last updated February 22, 2025)
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
0
Attacker Value
Unknown

CVE-2003-0465

Disclosure Date: August 18, 2003 (last updated February 22, 2025)
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
0
Attacker Value
Unknown

CVE-2003-0246

Disclosure Date: June 16, 2003 (last updated February 22, 2025)
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
0
Attacker Value
Unknown

CVE-2002-2254

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.
0