CVE-2004-0565

Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
References
Link Resource
http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html Vendor Advisory
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.mandriva.com/security/advisories?name=MDKSA-2004:066
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.securityfocus.com/bid/10687
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16644
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714
http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html Vendor Advisory
http://secunia.com/advisories/20162
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.mandriva.com/security/advisories?name=MDKSA-2004:066
http://www.redhat.com/support/errata/RHSA-2004-504.html
http://www.securityfocus.com/bid/10687
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16644
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714
Configurations

Configuration 1 (hide)

cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

History

20 Nov 2024, 23:48

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html - Vendor Advisory () http://archives.neohapsis.com/archives/linux/owl/2004-q2/0038.html - Vendor Advisory
References () http://secunia.com/advisories/20162 - () http://secunia.com/advisories/20162 -
References () http://secunia.com/advisories/20163 - () http://secunia.com/advisories/20163 -
References () http://secunia.com/advisories/20202 - () http://secunia.com/advisories/20202 -
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://www.debian.org/security/2006/dsa-1067 - () http://www.debian.org/security/2006/dsa-1067 -
References () http://www.debian.org/security/2006/dsa-1069 - () http://www.debian.org/security/2006/dsa-1069 -
References () http://www.debian.org/security/2006/dsa-1070 - () http://www.debian.org/security/2006/dsa-1070 -
References () http://www.debian.org/security/2006/dsa-1082 - () http://www.debian.org/security/2006/dsa-1082 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2004:066 - () http://www.mandriva.com/security/advisories?name=MDKSA-2004:066 -
References () http://www.redhat.com/support/errata/RHSA-2004-504.html - () http://www.redhat.com/support/errata/RHSA-2004-504.html -
References () http://www.securityfocus.com/bid/10687 - () http://www.securityfocus.com/bid/10687 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 - Vendor Advisory () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=124734 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/16644 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/16644 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10714 -

Information

Published : 2004-12-06 05:00

Updated : 2024-11-20 23:48


NVD link : CVE-2004-0565

Mitre link : CVE-2004-0565

CVE.ORG link : CVE-2004-0565


JSON object : View

Products Affected

trustix

  • secure_linux

gentoo

  • linux

mandrakesoft

  • mandrake_linux
  • mandrake_multi_network_firewall
  • mandrake_linux_corporate_server

linux

  • linux_kernel