A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18977 - | |
References | () http://secunia.com/advisories/19369 - | |
References | () http://www.debian.org/security/2006/dsa-1018 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:072 - | |
References | () http://www.securityfocus.com/bid/16759 - | |
References | () http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0313.html - Exploit | |
References | () http://www.uwsg.iu.edu/hypermail/linux/kernel/0404.2/0743.html - | |
References | () http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:53
NVD link : CVE-2004-2607
Mitre link : CVE-2004-2607
CVE.ORG link : CVE-2004-2607
JSON object : View
Products Affected
linux
- linux_kernel
CWE