CVE-2004-1058
https://notcve.org/view.php?id=CVE-2004-1058
Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html http://secunia.com/advisories/18684 http://secunia.com/advisories/19038 http://secunia.com/advisories/19369 http://secunia.com/advisories/19607 http://secunia.com/advisories/21476 http://www.debian.org/security/2006/dsa-1018 http://www.gentoo.org/security/en/glsa/glsa-200408-24.xml http://www.mandriva.com/security/advisories?name=MDKS •
CVE-2004-1056
https://notcve.org/view.php?id=CVE-2004-1056
Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. • http://secunia.com/advisories/17002 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 https://bugzilla.fedora.us/show_bug.cgi?id=2336 https://exchange.xforce.ibmcloud.com/vulnerabilities/15972 https://oval.cisecurity.org/repository/search/definition/oval •
CVE-2004-1016 – Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service
https://notcve.org/view.php?id=CVE-2004-1016
The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition. La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la función sendmsg, lo que produce una condición de bloqueo mutuo. • https://www.exploit-db.com/exploits/685 http://isec.pl/vulnerabilities/isec-0019-scm.txt http://secunia.com/advisories/20162 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 http://www.mandriva.com/security/advisories?name=MDKSA& •
CVE-2004-1137 – Linux Kernel 2.4.22-28/2.6.9 - 'igmp.c' Local Denial of Service
https://notcve.org/view.php?id=CVE-2004-1137
Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. • https://www.exploit-db.com/exploits/686 http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0018-igmp.txt http://marc.info/?l=bugtraq&m=110306397320336&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 http://www.novell.com/linux/security/advisories/2004_44_kernel.html http://www.redhat.com/support/errata/RHSA-2005-092.html https://bugzilla.fedora.us/show_bug.cgi?id=2336 https://exchange.xforce. •
CVE-2004-1151
https://notcve.org/view.php?id=CVE-2004-1151
Multiple buffer overflows in the (1) sys32_ni_syscall and (2) sys32_vm86_warning functions in sys_ia32.c for Linux 2.6.x may allow local attackers to modify kernel memory and gain privileges. • http://linux.bkbits.net:8080/linux-2.6/cset%401.2079 http://linux.bkbits.net:8080/linux-2.6/gnupatch%4041ae6af1cR3mJYlW6D8EHxCKSxuJiQ http://marc.info/?l=bugtraq&m=110306397320336&w=2 http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 http://www.novell.com/linux/security/advisories/2004_44_kernel.html http://www.ussg.iu.edu/hypermail/linux/kernel/0411.3/1467.html •