The ext3 code in Linux 2.4.x before 2.4.26 does not properly initialize journal descriptor blocks, which causes an information leak in which in-memory data is written to the device for the ext3 file system, which allows privileged users to obtain portions of kernel memory by reading the raw device.
distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846
linux.bkbits.net:8080/linux-2.4/cset%404056b368s6vpJbGWxDD_LhQNYQrdzQ
marc.info/?l=bugtraq&m=108213675028441&w=2
rhn.redhat.com/errata/RHSA-2004-166.html
security.gentoo.org/glsa/glsa-200407-02.xml
www.ciac.org/ciac/bulletins/o-121.shtml
www.ciac.org/ciac/bulletins/o-126.shtml
www.ciac.org/ciac/bulletins/o-127.shtml
www.debian.org/security/2004/dsa-479
www.debian.org/security/2004/dsa-480
www.debian.org/security/2004/dsa-481
www.debian.org/security/2004/dsa-482
www.debian.org/security/2004/dsa-489
www.debian.org/security/2004/dsa-491
www.debian.org/security/2004/dsa-495
www.linuxsecurity.com/advisories/engarde_advisory-4285.html
www.mandriva.com/security/advisories?name=MDKSA-2004:029
www.redhat.com/support/errata/RHSA-2004-504.html
www.redhat.com/support/errata/RHSA-2004-505.html
www.redhat.com/support/errata/RHSA-2005-293.html
www.securityfocus.com/bid/10152
bugzilla.fedora.us/show_bug.cgi?id=2336
exchange.xforce.ibmcloud.com/vulnerabilities/15867
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10556