Linux » Linux Kernel » 2.4.19 pre3 : Security Vulnerabilities, CVEs, Published In 2004 (Overflow)
Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory.
Max CVSS
7.8
EPSS Score
0.04%
Published
2004-12-31
Updated
2024-02-08
Integer overflow in the vc_resize function in the Linux kernel 2.4 and 2.6 before 2.6.10 allows local users to cause a denial of service (kernel crash) via a short new screen value, which leads to a buffer overflow.
Max CVSS
2.1
EPSS Score
0.04%
Published
2004-12-15
Updated
2018-10-03
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.
Max CVSS
7.2
EPSS Score
0.04%
Published
2004-08-06
Updated
2017-07-11
The e1000 driver for Linux kernel 2.4.26 and earlier does not properly initialize memory before using it, which allows local users to read portions of kernel memory. NOTE: this issue was originally incorrectly reported as a "buffer overflow" by some sources.
Max CVSS
2.1
EPSS Score
0.04%
Published
2004-08-06
Updated
2017-10-11
Stack-based buffer overflow in the ncp_lookup function for ncpfs in Linux kernel 2.4.x allows local users to gain privileges.
Max CVSS
7.2
EPSS Score
0.06%
Published
2004-03-03
Updated
2017-10-11
5 vulnerabilities found