CVE-2004-0997

Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*

History

20 Nov 2024, 23:49

Type Values Removed Values Added
References () http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes - Patch () http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes - Patch
References () http://secunia.com/advisories/20162 - Patch, Vendor Advisory () http://secunia.com/advisories/20162 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20163 - Patch, Vendor Advisory () http://secunia.com/advisories/20163 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20202 - Patch, Vendor Advisory () http://secunia.com/advisories/20202 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0 - () http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0 -
References () http://www.debian.org/security/2006/dsa-1067 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1067 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1069 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1069 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1070 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1070 - Patch, Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1082 - Patch, Vendor Advisory () http://www.debian.org/security/2006/dsa-1082 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/18176 - () http://www.securityfocus.com/bid/18176 -

Information

Published : 2004-12-31 05:00

Updated : 2024-11-20 23:49


NVD link : CVE-2004-0997

Mitre link : CVE-2004-0997

CVE.ORG link : CVE-2004-0997


JSON object : View

Products Affected

linux

  • linux_kernel