mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
158 lines
4.8 KiB
JSON
158 lines
4.8 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2003-0127",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "20030317 Fwd: Ptrace hole / Linux 2.2.25",
|
|
"refsource" : "VULNWATCH",
|
|
"url" : "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:098",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2003-098.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:088",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://rhn.redhat.com/errata/RHSA-2003-088.html"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:103",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2003-103.html"
|
|
},
|
|
{
|
|
"name" : "DSA-270",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-270"
|
|
},
|
|
{
|
|
"name" : "DSA-276",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-276"
|
|
},
|
|
{
|
|
"name" : "DSA-311",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-311"
|
|
},
|
|
{
|
|
"name" : "DSA-312",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-312"
|
|
},
|
|
{
|
|
"name" : "DSA-332",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-332"
|
|
},
|
|
{
|
|
"name" : "DSA-336",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2003/dsa-336"
|
|
},
|
|
{
|
|
"name" : "DSA-423",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2004/dsa-423"
|
|
},
|
|
{
|
|
"name" : "DSA-495",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2004/dsa-495"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2003:038",
|
|
"refsource" : "MANDRAKE",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038"
|
|
},
|
|
{
|
|
"name" : "MDKSA-2003:039",
|
|
"refsource" : "MANDRAKE",
|
|
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039"
|
|
},
|
|
{
|
|
"name" : "CSSA-2003-020.0",
|
|
"refsource" : "CALDERA",
|
|
"url" : "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt"
|
|
},
|
|
{
|
|
"name" : "ESA-20030515-017",
|
|
"refsource" : "ENGARDE",
|
|
"url" : "http://marc.info/?l=bugtraq&m=105301461726555&w=2"
|
|
},
|
|
{
|
|
"name" : "RHSA-2003:145",
|
|
"refsource" : "REDHAT",
|
|
"url" : "http://www.redhat.com/support/errata/RHSA-2003-145.html"
|
|
},
|
|
{
|
|
"name" : "GLSA-200303-17",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-200303-17.xml"
|
|
},
|
|
{
|
|
"name" : "VU#628849",
|
|
"refsource" : "CERT-VN",
|
|
"url" : "http://www.kb.cert.org/vuls/id/628849"
|
|
},
|
|
{
|
|
"name" : "oval:org.mitre.oval:def:254",
|
|
"refsource" : "OVAL",
|
|
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254"
|
|
}
|
|
]
|
|
}
|
|
}
|