
CVE-2004-2607
https://notcve.org/view.php?id=CVE-2004-2607
31 Dec 2004 — A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. • http://secunia.com/advisories/18977 •

CVE-2004-2660
https://notcve.org/view.php?id=CVE-2004-2660
31 Dec 2004 — Memory leak in direct-io.c in Linux kernel 2.6.x before 2.6.10 allows local users to cause a denial of service (memory consumption) via certain O_DIRECT (direct IO) write requests. • http://linux.bkbits.net:8080/linux-2.6/cset%404182a613oVsK0-8eCWpyYFrUf8rhLA •

CVE-2004-0997 – Debian Linux Security Advisory 1067-1
https://notcve.org/view.php?id=CVE-2004-0997
31 Dec 2004 — Unspecified vulnerability in the ptrace MIPS assembly code in Linux kernel 2.4 before 2.4.17 allows local users to gain privileges via unknown vectors. Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVE-2004-2013
https://notcve.org/view.php?id=CVE-2004-2013
31 Dec 2004 — Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. • http://archives.neohapsis.com/archives/bugtraq/2004-05/0091.html • CWE-190: Integer Overflow or Wraparound •

CVE-2004-0138
https://notcve.org/view.php?id=CVE-2004-0138
31 Dec 2004 — The ELF loader in Linux kernel 2.4 before 2.4.25 allows local users to cause a denial of service (crash) via a crafted ELF file with an interpreter with an invalid arch (architecture), which triggers a BUG() when an invalid VMA is unmapped. • http://kernel.debian.net/debian/pool/main/kernel-source-2.4.17/kernel-source-2.4.17_2.4.17-1woody4_ia64.changes •

CVE-2004-1144 – SUSE-SA-2004-046.txt
https://notcve.org/view.php?id=CVE-2004-1144
31 Dec 2004 — Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. Due to missing argument checking in the 32 bit compatibility system call handler in the 2.4 Linux Kernel on the AMD64 platform a local attacker can gain root access using a simple program. This is a 2.4 Kernel and AMD64 specific problem, other architectures and the 2.6 Kernel are not affected. • http://marc.info/?l=bugtraq&m=110376890429798&w=2 •

CVE-2004-1058 – Ubuntu Security Notice 38-1
https://notcve.org/view.php?id=CVE-2004-1058
22 Dec 2004 — Race condition in Linux kernel 2.6 allows local users to read the environment variables of another process that is still spawning via /proc/.../cmdline. Condición de carrera en el kernel de Linux 2.6 permite a usurios locales leer las variables de entorno de otros proceso que se está engendrando todavía mediante /proc/.../cmdline. This advisory covers all the recent vulnerabilities discovered in the Linux 2.6 kernel series. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVE-2004-1056 – Ubuntu Security Notice 38-1
https://notcve.org/view.php?id=CVE-2004-1056
22 Dec 2004 — Direct Rendering Manager (DRM) driver in Linux kernel 2.6 does not properly check the DMA lock, which could allow remote attackers or local users to cause a denial of service (X Server crash) and possibly modify the video output. El controlador Direct Rendering Manager (DRM) en el kernel de Linux 2.06 no comprueba adecuadamente el bloqueo DMA, lo que podría permitir a atacantes remotos o usuarios locales causar una denegación de servicio (caída del servidor X) y posiblemente modificar la salida de video. Th... • http://secunia.com/advisories/17002 •

CVE-2004-1333 – Linux Kernel 2.4.28/2.6.9 - vc_resize int Local Overflow
https://notcve.org/view.php?id=CVE-2004-1333
15 Dec 2004 — Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow. Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. • https://www.exploit-db.com/exploits/690 •

CVE-2004-1016 – Linux Kernel 2.4.28/2.6.9 - 'scm_send Local' Denial of Service
https://notcve.org/view.php?id=CVE-2004-1016
15 Dec 2004 — The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition. La función scm_send de la capa scm de los kernel de Linux 2.4.x hasta 2.4.28 y 2.6.x hasta 2.6.9 permite a usuarios locales causar una denegación de servicio (cuelgue del sistema) mediante mensajes auxiliares artesanales que son pasados a la fu... • https://packetstorm.news/files/id/35334 •