CVE-2004-0565

Floating point information leak in the context switch code for Linux 2.4.x only checks the MFH bit but does not verify the FPH owner, which allows local users to read register values of other processes by setting the MFH bit.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mandrakesoft:mandrake_multi_network_firewall:8.2:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.1:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-06 05:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-0565

Mitre link : CVE-2004-0565

CVE.ORG link : CVE-2004-0565


JSON object : View

Products Affected

mandrakesoft

  • mandrake_linux
  • mandrake_linux_corporate_server
  • mandrake_multi_network_firewall

trustix

  • secure_linux

linux

  • linux_kernel

gentoo

  • linux