CVE-2004-0565
Summary
| CVE | CVE-2004-0565 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2004-12-06 05:00:00 UTC |
| Updated | 2017-10-11 01:29:00 UTC |
| Description | Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Gentoo | Linux | All | All | All | All |
| Operating System | Gentoo | Linux | All | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.0 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.2 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 10.0 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux | 9.2 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 2.1 | All | All | All |
| Operating System | Mandrakesoft | Mandrake Linux Corporate Server | 2.1 | All | All | All |
| Application | Mandrakesoft | Mandrake Multi Network Firewall | 8.2 | All | All | All |
| Application | Mandrakesoft | Mandrake Multi Network Firewall | 8.2 | All | All | All |
| Operating System | Trustix | Secure Linux | 2 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
| Operating System | Trustix | Secure Linux | 2 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Debian -- Security Information -- DSA-1067-1 kernel-source-2.4.16 | DEBIAN | www.debian.org | |
| rhn.redhat.com | Red Hat Support | REDHAT | www.redhat.com | |
| Debian -- Security Information -- DSA-1070-1 kernel-source-2.4.19 | DEBIAN | www.debian.org | |
| Advisories - Mandriva | MANDRAKE | www.mandriva.com | |
| Debian -- Security Information -- DSA-1082-1 kernel-source-2.4.17 | DEBIAN | www.debian.org | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Linux Kernel Floating Point Register Contents Leak Vulnerability | BID | www.securityfocus.com | |
| Secunia - Advisories - Debian update for kernel-source-2.4.16 | SECUNIA | secunia.com | |
| Neohapsis Archives - Owl Linux discussion - #0038 - Linux 2.4.26-ow2 | MLIST | archives.neohapsis.com | Vendor Advisory |
| Secunia - Advisories - Debian update for kernel-source-2.4.18 | SECUNIA | secunia.com | |
| 124734 – CAN-2004-0565 Information leak on Linux/ia64 | MISC | bugzilla.redhat.com | Vendor Advisory |
| Secunia - Advisories - Debian update for kernel-source-2.4.17 | SECUNIA | secunia.com | |
| IBM X-Force Exchange | XF | exchange.xforce.ibmcloud.com | |
| Debian -- Security Information -- DSA-1069-1 kernel-source-2.4.18 | DEBIAN | www.debian.org | |
| Secunia - Advisories - Debian update for kernel-source-2.4.19 | SECUNIA | secunia.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.