CVE-2004-0814
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
23/12/2004
Last modified:
03/04/2025
Description
Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.
Impact
Base Score 2.0
1.20
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110
- http://marc.info/?l=bugtraq&m=110306397320336&w=2
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A022
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.securityfocus.com/archive/1/379005
- http://www.securityfocus.com/bid/11491
- http://www.securityfocus.com/bid/11492
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17816
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=131672
- http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133110
- http://marc.info/?l=bugtraq&m=110306397320336&w=2
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A022
- http://www.redhat.com/support/errata/RHSA-2005-293.html
- http://www.securityfocus.com/archive/1/379005
- http://www.securityfocus.com/bid/11491
- http://www.securityfocus.com/bid/11492
- https://bugzilla.fedora.us/show_bug.cgi?id=2336
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17816
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10728



