CVE-2004-0495

Multiple unknown vulnerabilities in Linux kernel 2.4 and 2.6 allow local users to gain privileges or access kernel memory, as found by the Sparse source code checking tool.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
http://lwn.net/Articles/91155/
http://security.gentoo.org/glsa/glsa-200407-02.xml Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-255.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-260.html
http://www.securityfocus.com/bid/10566 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000845
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
http://lwn.net/Articles/91155/
http://security.gentoo.org/glsa/glsa-200407-02.xml Vendor Advisory
http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066
http://www.novell.com/linux/security/advisories/2004_20_kernel.html
http://www.redhat.com/support/errata/RHSA-2004-255.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2004-260.html
http://www.securityfocus.com/bid/10566 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16449
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10155
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2961
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:avaya:converged_communications_server:2.0:*:*:*:*:*:*:*
cpe:2.3:o:avaya:modular_messaging_message_storage_server:s3400:*:*:*:*:*:*:*
cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:7:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*
cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:avaya:intuity_audix:*:*:lx:*:*:*:*:*
cpe:2.3:a:suse:suse_email_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_email_server:iii:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_admin-cd_for_firewall:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_firewall_cd:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
cpe:2.3:a:suse:suse_office_server:*:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8300:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8500:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.0:*:*:*:*:*:*:*
cpe:2.3:h:avaya:s8700:r2.0.1:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-08-06 04:00

Updated : 2025-04-03 01:03


NVD link : CVE-2004-0495

Mitre link : CVE-2004-0495

CVE.ORG link : CVE-2004-0495


JSON object : View

Products Affected

suse

  • suse_linux_connectivity_server
  • suse_email_server
  • suse_linux_firewall_cd
  • suse_linux_admin-cd_for_firewall
  • suse_office_server
  • suse_linux
  • suse_linux_database_server
  • suse_linux_office_server

conectiva

  • linux

avaya

  • s8500
  • modular_messaging_message_storage_server
  • s8300
  • s8700
  • converged_communications_server
  • intuity_audix

gentoo

  • linux

redhat

  • enterprise_linux

linux

  • linux_kernel