Show filters
17 Total Results
Displaying 11-17 of 17
Sort by:
Attacker Value
Unknown
CVE-2004-0685
Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
0
Attacker Value
Unknown
CVE-2004-0658
Disclosure Date: August 06, 2004 (last updated February 22, 2025)
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.
0
Attacker Value
Unknown
CVE-2004-0109
Disclosure Date: June 01, 2004 (last updated February 22, 2025)
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry.
0
Attacker Value
Unknown
CVE-2004-2135
Disclosure Date: May 26, 2004 (last updated February 22, 2025)
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
0
Attacker Value
Unknown
CVE-2003-0465
Disclosure Date: August 18, 2003 (last updated February 22, 2025)
The kernel strncpy function in Linux 2.4 and 2.5 does not %NUL pad the buffer on architectures other than x86, as opposed to the expected behavior of strncpy as implemented in libc, which could lead to information leaks.
0
Attacker Value
Unknown
CVE-2003-0246
Disclosure Date: June 16, 2003 (last updated February 22, 2025)
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
0
Attacker Value
Unknown
CVE-2002-2254
Disclosure Date: December 31, 2002 (last updated February 22, 2025)
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.
0