CVE-2004-0554 – Linux Kernel 2.4.x/2.6.x - Assembler Inline Function Local Denial of Service
https://notcve.org/view.php?id=CVE-2004-0554
Linux kernel 2.4.x and 2.6.x for x86 allows local users to cause a denial of service (system crash), possibly via an infinite loop that triggers a signal handler with a certain sequence of fsave and frstor instructions, as originally demonstrated using a "crash.c" program. El kernel de Linux 2.4.2x y 2.6.x para x86 permite a usuarios locales causar una denegación de servicio (caída del sistema), posiblemente mediante un bucle infinito que dispara un manejador de señal con una cierta secuencia de instrucciones fsave y fstor, originalmente demostrado con el programa "crash.c". • https://www.exploit-db.com/exploits/306 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=15905 http://linuxreviews.org/news/2004-06-11_kernel_crash/index.html http://lwn.net/Articles/91155 http://marc.info/?l=bugtraq&m=108786114032681&w=2 http://marc.info/?l=bugtraq&m=108793699910896&w=2 http://marc.info/? •
CVE-2004-0535
https://notcve.org/view.php?id=CVE-2004-0535
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources. El controlador e1000 del kernel de Linux 2.4.26 y anteriores no inicializa la memoria antes de usarla, lo que permite a usuarios locales leer porciones de la memoria del kernel. NOTA: Este problema ha sido originalmente descrito incorrectamente por otras fuentes como un "desbordamiento de búfer". • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=125168 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 http://lwn.net/Articles/91155 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.kernel.org/pub/linux/kernel/v2.4/testing/patch-2.4.27.log http://www.mandriva.com/security/advisories?name=MDKSA-2004:062 http://www.novell.com/linux/security/advisories/2004_20_kern •
CVE-2004-0228 – Linux Kernel 2.5.x/2.6.x - CPUFreq Proc Handler Integer Handling Memory Read
https://notcve.org/view.php?id=CVE-2004-0228
Integer signedness error in the cpufreq proc handler (cpufreq_procctl) in Linux kernel 2.6 allows local users to gain privileges. Error falta de signo en enteros en el manejador proc cpufreq (cpufrep_procctl) en Linux kernel 2.6 permite a usuarios locales ganar privilegios. • https://www.exploit-db.com/exploits/24043 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://fedoranews.org/updates/FEDORA-2004-111.shtml http://secunia.com/advisories/11429 http://secunia.com/advisories/11464 http://secunia.com/advisories/11486 http://secunia.com/advisories/11491 http://secunia.com/advisories/11683 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:050 http://www.novell.com •
CVE-2004-2135 – Linux Kernel 2.6.x - Cryptoloop Information Disclosure
https://notcve.org/view.php?id=CVE-2004-2135
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption. • https://www.exploit-db.com/exploits/25707 http://marc.info/?l=linux-kernel&m=107719798631935&w=2 http://mareichelt.de/pub/notmine/diskenc.pdf http://www.securiteam.com/exploits/5UP0P1PFPM.html http://www.securityfocus.com/bid/13775 •
CVE-2004-0229
https://notcve.org/view.php?id=CVE-2004-0229
The framebuffer driver in Linux kernel 2.6.x does not properly use the fb_copy_cmap function, with unknown impact. El controlador de framebuffer en Linux kernel 2.6.x no usa adecuadamente la función fb_copy_cmap, con impacto desconocido. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.mandriva.com/security/advisories?name=MDKSA-2004:037 http://www.novell.com/linux/security/advisories/2004_10_kernel.html http://www.securityfocus.com/bid/10211 https://exchange.xforce.ibmcloud.com/vulnerabilities/15974 •