CVE-2004-0177
https://notcve.org/view.php?id=CVE-2004-0177
The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device. El código ext3 en Linux 2.4.x no inicializa adecuadamente bloques de descriptores de diario, lo que causa una fuga de información en la que datos de memoria son escritos en el dispositivo de un sistema de ficheros ext3, lo que permite a usuarios privilegiados obtener porciones de la memoria del kernel leyendo directamente del dispositivo. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 http://linux.bkbits.net:8080/linux-2.4/cset%404056b368s6vpJbGWxDD_LhQNYQrdzQ http://marc.info/?l=bugtraq&m=108213675028441&w=2 http://rhn.redhat.com/errata/RHSA-2004-166.html http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.ciac.org/ciac/bulletins/o-121.shtml http://www.ciac.org/ciac/bulletins/o-126.shtml http://www.ciac.org/ciac/bulletins/o-127.shtml http://www.debian.org/security/ •
CVE-2004-0178
https://notcve.org/view.php?id=CVE-2004-0178
The OSS code for the Sound Blaster (sb16) driver in Linux 2.4.x before 2.4.26, when operating in 16 bit mode, does not properly handle certain sample sizes, which allows local users to cause a denial of service (crash) via a sample with an odd number of bytes. El código OSS del controlador de Sound Blaster en Linux 2.4.x no maneja adecuadamente ciertos tamaños de muestreo, lo que permite a usuarios locales causar una denegación de servicio (caída) • ftp://patches.sgi.com/support/free/security/advisories/20040804-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 http://linux.bkbits.net:8080/linux-2.4/cset%40404ce5967rY2Ryu6Z_uNbYh643wuFA http://security.gentoo.org/glsa/glsa-200407-02.xml http://www.ciac.org/ciac/bulletins/o-121.shtml http://www.ciac.org/ciac/bulletins/o-127.shtml http://www.ciac.org/ciac/bulletins/o-193.shtml http://www.debian.org/security/2004/dsa-479 http://www.debia •
CVE-2004-0109
https://notcve.org/view.php?id=CVE-2004-0109
Buffer overflow in the ISO9660 file system component for Linux kernel 2.4.x, 2.5.x and 2.6.x, allows local users with physical access to overflow kernel memory and execute arbitrary code via a malformed CD containing a long symbolic link entry. Desbordamiento de búfer en el componente de sistema de ficheros ISO9660 del kernel de Linux 2.4.x y 2.6.x permite a usuarios locales con acceso físico desbordar memoria del kernel y ejecutar código arbitrario mediante un CD malformado con un una entrada de enlace simbólico larga. • ftp://patches.sgi.com/support/free/security/advisories/20040405-01-U.asc ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 http://marc.info/?l=bugtraq&m=108213675028441&w=2 http://rhn.redhat.com/errata/RHSA-2004-166.html http://secunia.com/advisories/11361 http://secunia.com/advisories/11362 http://secunia.com/advisories/11373 http://secunia.com/advisories/11429 http://secunia.com •
CVE-2003-1040
https://notcve.org/view.php?id=CVE-2003-1040
kmod in the Linux kernel does not set its uid, suid, gid, or sgid to 0, which allows local users to cause a denial of service (crash) by sending certain signals to kmod. kmod en el kernel de Linux no establece su uid, gid o sgid a 0, lo que permite a usuarios locales causar una denegación de servicio (caída) enviando ciertas señales a kmod. • ftp://patches.sgi.com/support/free/security/advisories/20040204-01-U.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000820 http://linux.bkbits.net:8080/linux-2.4/diffs/kernel/kmod.c%401.6?nav=index.html%7Csrc/%7Csrc/kernel%7Chist/kernel/kmod.c http://www.novell.com/linux/security/advisories/2003_049_kernel.html http://www.redhat.com/support/errata/RHSA-2004-065.html http://www.redhat.com/support/errata/RHSA-2004-069.html http://www.redhat.com/support •
CVE-2004-0186 – Samba 2.2.8 (Linux Kernel 2.6 / Debian / Mandrake) - Share Privilege Escalation
https://notcve.org/view.php?id=CVE-2004-0186
smbmnt in Samba 2.x and 3.x on Linux 2.6, when installed setuid, allows local users to gain root privileges by mounting a Samba share that contains a setuid root program, whose setuid attributes are not cleared when the share is mounted. smbmnt en Samba 2.0 y 3.0 para Linux 2.6, cuando se instala con setuid, permite a usuarios locales ganar privilegios de root montando un recurso compartido de Samba que contiene un programa con setuid de root, cuyos atributos no se limpian cuando el recurso compartido es eliminado. • https://www.exploit-db.com/exploits/23674 http://marc.info/?l=bugtraq&m=107636290906296&w=2 http://marc.info/?l=bugtraq&m=107657505718743&w=2 http://www.debian.org/security/2004/dsa-463 http://www.osvdb.org/3916 http://www.securityfocus.com/bid/9619 https://exchange.xforce.ibmcloud.com/vulnerabilities/15131 •