![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2607
https://notcve.org/view.php?id=CVE-2004-2607
31 Dec 2004 — A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. • http://secunia.com/advisories/18977 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1144
https://notcve.org/view.php?id=CVE-2004-1144
31 Dec 2004 — Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. • http://marc.info/?l=bugtraq&m=110376890429798&w=2 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-0138
https://notcve.org/view.php?id=CVE-2004-0138
31 Dec 2004 — The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2536
https://notcve.org/view.php?id=CVE-2004-2536
31 Dec 2004 — The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. • http://secunia.com/advisories/11577 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-2013
https://notcve.org/view.php?id=CVE-2004-2013
31 Dec 2004 — Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. • http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html • CWE-190: Integer Overflow or Wraparound •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1058
https://notcve.org/view.php?id=CVE-2004-1058
22 Dec 2004 — Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1056
https://notcve.org/view.php?id=CVE-2004-1056
22 Dec 2004 — Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. • http://secunia.com/advisories/17002 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1137 – Linux Kernel 2.4.22-28/2.6.9 - 'igmp.c' Local Denial of Service
https://notcve.org/view.php?id=CVE-2004-1137
15 Dec 2004 — Multiple vulnerabilities in the IGMP functionality for Linux kernel 2.4.22 to 2.4.28, and 2.6.x to 2.6.9, allow local and remote attackers to cause a denial of service or execute arbitrary code via (1) the ip_mc_source function, which decrements a counter to -1, or (2) the igmp_marksources function, which does not properly validate IGMP message parameters and performs an out-of-bounds read. • https://www.exploit-db.com/exploits/686 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1016 – Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service
https://notcve.org/view.php?id=CVE-2004-1016
15 Dec 2004 — The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition. La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la fu... • https://www.exploit-db.com/exploits/685 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2004-1333 – Linux Kernel 2.4.28/2.6.9 - vc_resize int Local Overflow
https://notcve.org/view.php?id=CVE-2004-1333
15 Dec 2004 — Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. • https://www.exploit-db.com/exploits/690 •