CVE-2004-0394
https://notcve.org/view.php?id=CVE-2004-0394
A "potential" buffer overflow exists in the panic() function in Linux 2.4.x, although it may not be exploitable due to the functionality of panic. Un desbordamiento de búfer "potencial" existe en la función panic() de Linux 2.4.x, aunque puede no ser explotable debido a la funcionalidad de panic() • ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 http://lwn.net/Articles/81773 http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.debian.org/security/2006/d •
CVE-2004-0427
https://notcve.org/view.php?id=CVE-2004-0427
The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call. La función do_fork en Linux 2.4.x y 2.6.x no decrementa el contador mm_count cuando un error ocurre después de que se haya activado mm_struct de un proceso hijo, lo que dispara una fuga de memoria que permite a usarios locales causar una denegación de servicio (consumición de memoria). • ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 http://fedoranews.org/updates/FEDORA-2004-111.shtml http://linux.bkbits.net:8080/linux-2.4/cset%40407bf20eDeeejm8t36_tpvSE-8EFHA http://linux.bkbits.net:8080/linux-2.6/cset%40407b1217x4jtqEkpFW2g_-RcF0726A http://marc.info/?l=linux-kernel&m=108139073506983&w=2 http://secuni • CWE-401: Missing Release of Memory after Effective Lifetime •
CVE-2004-0424 – Linux Kernel 2.6.3 - 'setsockopt' Local Denial of Service
https://notcve.org/view.php?id=CVE-2004-0424
Integer overflow in the ip_setsockopt function in Linux kernel 2.4.22 through 2.4.25 and 2.6.1 through 2.6.3 allows local users to cause a denial of service (crash) or execute arbitrary code via the MCAST_MSFILTER socket option. Desbordamiento de enteros en la función ip_setsockopt en el kernel de Linux 2.4.22 a 2.4.25 y 2.6.1 a 2.6.3 permite a usuarios locales causar una denegación de servicio (caída) o ejecutar código arbitrario mediante la opción de socket MCAST_MSFILTER. • https://www.exploit-db.com/exploits/274 ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://marc.info/?l=bugtraq&m=108253171301153&w=2 http://www.isec.pl/vulnerabilities/isec-0015-msfilter.txt http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:037 http://www.novell.com/linux/security/advisories/2004_10_kernel.html •
CVE-2004-0181
https://notcve.org/view.php?id=CVE-2004-0181
The JFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the JFS file system, which allows local users to obtain sensitive information by reading the raw device. • http://marc.info/?l=bugtraq&m=108213675028441&w=2 http://secunia.com/advisories/17002 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:029 http://www.redhat.com/support/errata/RHSA-2004-504.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.securityfocus.com/bid/10143 http://www.turbolinux.com/security/2004/TLSA-2004-14.txt •
CVE-2004-0133
https://notcve.org/view.php?id=CVE-2004-0133
The XFS file system code in Linux 2.4.x has an information leak in which in-memory data is written to the device for the XFS file system, which allows local users to obtain sensitive information by reading the raw device. El código del sistema de ficheros XFS en Linux 2.4.x tiene una fuga de información en la cual datas de memoria son escritos en el dispositivo de un sistema de ficheros ext3, lo que permite a usuarios locales obtener información sensible leyendo el dispositivo directamente (raw) • ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc http://marc.info/?l=bugtraq&m=108213675028441&w=2 http://secunia.com/advisories/11362 http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.linuxsecurity.com/advisories/engarde_advisory-4285.html http://www.mandriva.com/security/advisories?name=MDKSA-2004:029 http://www.securityfocus.com/bid/10151 https://exchange.xforce.ibmcloud.com/vulnerabilities/15901 •