CVE-2004-0003
https://notcve.org/view.php?id=CVE-2004-0003
03 Feb 2004 — Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking." Vulnerabilidad desconocida en el kernel de Linux anterior a 2.4.22 permite a usuarios locales ganar privilegios, relacionada con "comprobación de límites R128 DRI". • http://secunia.com/advisories/10782 •
CVE-2003-0985 – Linux Kernel 2.4.23/2.6.0 - 'do_mremap()' Bound Checking Validator
https://notcve.org/view.php?id=CVE-2003-0985
20 Jan 2004 — The mremap system call (do_mremap) in Linux kernel 2.4.x before 2.4.21, and possibly other versions before 2.4.24, does not properly perform bounds checks, which allows local users to cause a denial of service and possibly gain privileges by causing a remapping of a virtual memory area (VMA) to create a zero length VMA, a different vulnerability than CAN-2004-0077. La llamada de sistema mremap (do_mremap) en Linux kernel 2.2, 2.4 y 2.6 y posiblemente otras versiones anteriores a 2.4.24, no realiza adecuadam... • https://www.exploit-db.com/exploits/141 •
CVE-2004-0058
https://notcve.org/view.php?id=CVE-2004-0058
15 Jan 2004 — Antivir / Linux 2.0.9-9, and possibly earlier versions, allows local users to overwrite arbitrary files via a symlink attack on the .pid_antivir_$$ temporary file. Antivir / Linux 2.0.9-9, y posiblemente versiones anteriores, permite a usuarios locales sobreescribir ficheros arbitrarios mediante un ataque de enlaces simbólicos en el fichero temporal .pid_antivir_$$ • http://marc.info/?l=bugtraq&m=107402026023763&w=2 •
CVE-2003-0959
https://notcve.org/view.php?id=CVE-2003-0959
31 Dec 2003 — Multiple integer overflows in the 32bit emulation for AMD64 architectures in Linux 2.4 kernel before 2.4.21 allows attackers to cause a denial of service or gain root privileges via unspecified vectors that trigger copy_from_user function calls with improper length arguments. • http://linux.bkbits.net:8080/linux-2.4/cset%403ed382f7UfJ9Q2LKCJq1Tc5B7-EC5A •
CVE-2003-0956
https://notcve.org/view.php?id=CVE-2003-0956
31 Dec 2003 — Multiple race conditions in the handling of O_DIRECT in Linux kernel prior to version 2.4.22 could cause stale data to be returned from the disk when handling sparse files, or cause incorrect data to be returned when a file is truncated as it is being read, which might allow local users to obtain sensitive data that was originally owned by other users, a different vulnerability than CVE-2003-0018. • http://linux.bkbits.net:8080/linux-2.4/cset%403ef33d95ym_22QH2xwhDMt264M55Fg •
CVE-2003-0986
https://notcve.org/view.php?id=CVE-2003-0986
31 Dec 2003 — Various routines for the ppc64 architecture on Linux kernel 2.6 prior to 2.6.2 and 2.4 prior to 2.4.24 do not use the copy_from_user function when copying data from userspace to kernelspace, which crosses security boundaries and allows local users to cause a denial of service. • http://linux.bkbits.net:8080/linux-2.4/cset%403fdd54b3u9Eq0Wny2Nn1HGfI3pofOQ •
CVE-2003-0984
https://notcve.org/view.php?id=CVE-2003-0984
23 Dec 2003 — Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space. Las rutinas de reloj de tiempo real (RTC - real time clock) en Linux kernel 2.4.23 y anteriores no inicializan adecuadamente sus estructuras, lo que podría filtrar datos del kernel en espacio de usuario. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000799 •
CVE-2003-0961 – Linux Kernel 2.4.22 - 'do_brk()' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2003-0961
02 Dec 2003 — Integer overflow in the do_brk function for the brk system call in Linux kernel 2.4.22 and earlier allows local users to gain root privileges. Un "error en comprobaciones de límites" en la función do_brk del kernel de Linux 2.4.22 y anteriores permite a usuarios locales ganar privilegios de root. • https://www.exploit-db.com/exploits/131 •
CVE-2003-0187
https://notcve.org/view.php?id=CVE-2003-0187
05 Aug 2003 — The connection tracking core of Netfilter for Linux 2.4.20, with CONFIG_IP_NF_CONNTRACK enabled or the ip_conntrack module loaded, allows remote attackers to cause a denial of service (resource consumption) due to an inconsistency with Linux 2.4.20's support of linked lists, which causes Netfilter to fail to identify connections with an UNCONFIRMED status and use large timeouts. El núcleo de seguimiento de conexiones de Netfilter para Linux 2.4.20, con CONFIG_IP_NF_CONNTRACK activado o con el módulo ip_conn... • http://marc.info/?l=bugtraq&m=105986028426824&w=2 •
CVE-2003-0467
https://notcve.org/view.php?id=CVE-2003-0467
05 Aug 2003 — Unknown vulnerability in ip_nat_sack_adjust of Netfilter in Linux kernels 2.4.20, and some 2.5.x, when CONFIG_IP_NF_NAT_FTP or CONFIG_IP_NF_NAT_IRC is enabled, or the ip_nat_ftp or ip_nat_irc modules are loaded, allows remote attackers to cause a denial of service (crash) in systems using NAT, possibly due to an integer signedness error. Vulnerabilidad desconocida en ip_nat_sack_adjust de Netfilter en los kernels de Linux 2.4.20 y algunos 2.5.x,cuando CONFIG_IP_NF_NAT_FTP o CONFIG_IP_NF_NAT_IRC están activa... • http://marc.info/?l=bugtraq&m=105985703724758&w=2 •