CVE-2004-0495

Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
http://lwn.net/Articles/91155/
http://security.gentoo.org/glsa/glsa-200407-02.xml Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-255.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-260.html
http://www.securityfocus.com/bid/10566 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
http://lwn.net/Articles/91155/
http://security.gentoo.org/glsa/glsa-200407-02.xml Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-255.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-260.html
http://www.securityfocus.com/bid/10566 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*
cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*
cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845 -
References () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 - () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 -
References () http://lwn.net/Articles/91155/ - () http://lwn.net/Articles/91155/ -
References () http://security.gentoo.org/glsa/glsa-200407-02.xml - Vendor Advisory () http://security.gentoo.org/glsa/glsa-200407-02.xml - Vendor Advisory
References () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066 - () http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066 -
References () http://www.novell.com/linux/security/advisories/2004_20_kernel.html - () http://www.novell.com/linux/security/advisories/2004_20_kernel.html -
References () http://www.redhat.com/support/errata/RHSA-2004-255.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2004-255.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2004-260.html - () http://www.redhat.com/support/errata/RHSA-2004-260.html -
References () http://www.securityfocus.com/bid/10566 - Patch, Vendor Advisory () http://www.securityfocus.com/bid/10566 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16449 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16449 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961 -

Information

Published : 2004-08-06 04:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0495

Mitre link : CVE-2004-0495

CVE.ORG link : CVE-2004-0495


JSON object : View

Products Affected

conectiva

  • linux

linux

  • linux_kernel

suse

  • suse_linux
  • suse_email_server
  • suse_linux_firewall_cd
  • suse_linux_admin-cd_for_firewall
  • suse_linux_office_server
  • suse_office_server
  • suse_linux_connectivity_server
  • suse_linux_database_server

gentoo

  • linux

avaya

  • intuity_audix
  • s8300
  • s8500
  • s8700
  • converged_communications_server
  • modular_messaging_message_storage_server

redhat

  • enterprise_linux