1.2

CVE-2004-0814

Multiple race conditions in the terminal layer in Linux 2.4.x, and 2.6.x before 2.6.9, allow (1) local users to obtain portions of kernel data via a TIOCSETD ioctl call to a terminal interface that is being accessed by another thread, or (2) remote attackers to cause a denial of service (panic) by switching from console to PPP line discipline, then quickly sending data that is received during the switch.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.2.0
LinuxLinux Kernel Version2.2.1
LinuxLinux Kernel Version2.2.2
LinuxLinux Kernel Version2.2.3
LinuxLinux Kernel Version2.2.7
LinuxLinux Kernel Version2.2.8
LinuxLinux Kernel Version2.2.9
LinuxLinux Kernel Version2.2.10
LinuxLinux Kernel Version2.2.11
LinuxLinux Kernel Version2.2.12
LinuxLinux Kernel Version2.2.13
LinuxLinux Kernel Version2.2.14
LinuxLinux Kernel Version2.2.15
LinuxLinux Kernel Version2.2.15 Updatepre16
LinuxLinux Kernel Version2.2.15_pre20
LinuxLinux Kernel Version2.2.16
LinuxLinux Kernel Version2.2.16 Updatepre6
LinuxLinux Kernel Version2.2.17
LinuxLinux Kernel Version2.2.18
LinuxLinux Kernel Version2.2.19
LinuxLinux Kernel Version2.2.20
LinuxLinux Kernel Version2.2.21
LinuxLinux Kernel Version2.2.22
LinuxLinux Kernel Version2.2.23
LinuxLinux Kernel Version2.2.24
LinuxLinux Kernel Version2.2.25
LinuxLinux Kernel Version2.4.0
LinuxLinux Kernel Version2.4.0 Updatetest1
LinuxLinux Kernel Version2.4.0 Updatetest10
LinuxLinux Kernel Version2.4.0 Updatetest11
LinuxLinux Kernel Version2.4.0 Updatetest12
LinuxLinux Kernel Version2.4.0 Updatetest2
LinuxLinux Kernel Version2.4.0 Updatetest3
LinuxLinux Kernel Version2.4.0 Updatetest4
LinuxLinux Kernel Version2.4.0 Updatetest5
LinuxLinux Kernel Version2.4.0 Updatetest6
LinuxLinux Kernel Version2.4.0 Updatetest7
LinuxLinux Kernel Version2.4.0 Updatetest8
LinuxLinux Kernel Version2.4.0 Updatetest9
LinuxLinux Kernel Version2.4.1
LinuxLinux Kernel Version2.4.2
LinuxLinux Kernel Version2.4.3
LinuxLinux Kernel Version2.4.4
LinuxLinux Kernel Version2.4.5
LinuxLinux Kernel Version2.4.6
LinuxLinux Kernel Version2.4.7
LinuxLinux Kernel Version2.4.8
LinuxLinux Kernel Version2.4.9
LinuxLinux Kernel Version2.4.10
LinuxLinux Kernel Version2.4.11
LinuxLinux Kernel Version2.4.12
LinuxLinux Kernel Version2.4.13
LinuxLinux Kernel Version2.4.14
LinuxLinux Kernel Version2.4.15
LinuxLinux Kernel Version2.4.16
LinuxLinux Kernel Version2.4.17
LinuxLinux Kernel Version2.4.18
LinuxLinux Kernel Version2.4.18 Editionx86
LinuxLinux Kernel Version2.4.18 Updatepre1
LinuxLinux Kernel Version2.4.18 Updatepre2
LinuxLinux Kernel Version2.4.18 Updatepre3
LinuxLinux Kernel Version2.4.18 Updatepre4
LinuxLinux Kernel Version2.4.18 Updatepre5
LinuxLinux Kernel Version2.4.18 Updatepre6
LinuxLinux Kernel Version2.4.18 Updatepre7
LinuxLinux Kernel Version2.4.18 Updatepre8
LinuxLinux Kernel Version2.4.19
LinuxLinux Kernel Version2.4.19 Updatepre1
LinuxLinux Kernel Version2.4.19 Updatepre2
LinuxLinux Kernel Version2.4.19 Updatepre3
LinuxLinux Kernel Version2.4.19 Updatepre4
LinuxLinux Kernel Version2.4.19 Updatepre5
LinuxLinux Kernel Version2.4.19 Updatepre6
LinuxLinux Kernel Version2.4.20
LinuxLinux Kernel Version2.4.21
LinuxLinux Kernel Version2.4.21 Updatepre1
LinuxLinux Kernel Version2.4.21 Updatepre4
LinuxLinux Kernel Version2.4.21 Updatepre7
LinuxLinux Kernel Version2.4.22
LinuxLinux Kernel Version2.4.23
LinuxLinux Kernel Version2.4.23 Updatepre9
LinuxLinux Kernel Version2.4.23_ow2
LinuxLinux Kernel Version2.4.24
LinuxLinux Kernel Version2.4.24_ow1
LinuxLinux Kernel Version2.4.25
LinuxLinux Kernel Version2.4.26
LinuxLinux Kernel Version2.4.27 Updatepre1
LinuxLinux Kernel Version2.4.27 Updatepre2
LinuxLinux Kernel Version2.4.27 Updatepre3
LinuxLinux Kernel Version2.4.27 Updatepre4
LinuxLinux Kernel Version2.4.27 Updatepre5
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.2
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6_test9_cvs
UbuntuUbuntu Linux Version4.1 Editionia64
UbuntuUbuntu Linux Version4.1 Editionppc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.24% 0.44
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 1.2 1.9 2.9
AV:L/AC:H/Au:N/C:N/I:N/A:P