CVE-2004-2536
https://notcve.org/view.php?id=CVE-2004-2536
The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. • http://secunia.com/advisories/11577 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.6 http://www.osvdb.org/5997 http://www.securityfocus.com/bid/10302 http://www.ussg.iu.edu/hypermail/linux/kernel/0405.0/1242.html http://www.ussg.iu.edu/hypermail/linux/kernel/0405.0/1265.html https://exchange.xforce.ibmcloud.com/vulnerabilities/16106 •
CVE-2004-0997
https://notcve.org/view.php?id=CVE-2004-0997
Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://svn.debian.org/wsvn/kernel/patch-tracking/CVE-2004-0997?op=file&rev=0&sc=0 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/20 •
CVE-2004-1017
https://notcve.org/view.php?id=CVE-2004-1017
Multiple "overflows" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors. • http://secunia.com/advisories/19374 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.redhat.com/support/errata/RHSA-2004-689.html h •
CVE-2004-2660
https://notcve.org/view.php?id=CVE-2004-2660
Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests. • http://linux.bkbits.net:8080/linux-2.6/cset%404182a613oVsK0-8eCWpyYFrUf8rhLA http://secunia.com/advisories/21605 http://secunia.com/advisories/22093 http://secunia.com/advisories/22174 http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm http://www.debian.org/security/2006/dsa-1184 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.10 http://www.redhat.com/support/errata/RHSA-2006-0617.html http://www.securityfocus.com/bid/19665 https://oval.cisecurity. •
CVE-2004-1058
https://notcve.org/view.php?id=CVE-2004-1058
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://secunia.com/advisories/18684 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19607 http://secunia.com/advisories/21476 http://www.debian.org/security/2006/dsa-1018 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandriva.com/security/advisories?name=MDKS •