The binary compatibility mode for FreeBSD 4.x and 5.x does not properly handle certain Linux system calls, which could allow local users to access kernel memory to gain privileges or cause a system panic.
References
Link | Resource |
---|---|
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:13.linux.asc | Patch Vendor Advisory |
http://www.securityfocus.com/bid/10643 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16558 | |
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:13.linux.asc | Patch Vendor Advisory |
http://www.securityfocus.com/bid/10643 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16558 |
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:13.linux.asc - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/10643 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16558 - |
Information
Published : 2004-12-06 05:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0602
Mitre link : CVE-2004-0602
CVE.ORG link : CVE-2004-0602
JSON object : View
Products Affected
freebsd
- freebsd
CWE