The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U - | |
References | () http://secunia.com/advisories/19607 - Vendor Advisory | |
References | () http://secunia.com/advisories/20162 - Vendor Advisory | |
References | () http://secunia.com/advisories/20163 - Vendor Advisory | |
References | () http://secunia.com/advisories/20202 - Vendor Advisory | |
References | () http://secunia.com/advisories/20338 - Vendor Advisory | |
References | () http://www.debian.org/security/2006/dsa-1067 - | |
References | () http://www.debian.org/security/2006/dsa-1069 - | |
References | () http://www.debian.org/security/2006/dsa-1070 - | |
References | () http://www.debian.org/security/2006/dsa-1082 - | |
References | () http://www.isec.pl/vulnerabilities/isec-0017-binfmt_elf.txt - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-504.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-505.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2004-549.html - | |
References | () http://www.securityfocus.com/bid/11646 - | |
References | () https://bugzilla.fedora.us/show_bug.cgi?id=2336 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/18025 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9450 - |
Information
Published : 2005-01-10 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1070
Mitre link : CVE-2004-1070
CVE.ORG link : CVE-2004-1070
JSON object : View
Products Affected
linux
- linux_kernel
trustix
- secure_linux
redhat
- fedora_core
- enterprise_linux_desktop
- enterprise_linux
- linux_advanced_workstation
suse
- suse_linux
turbolinux
- turbolinux_server
CWE