A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1018-1 | New Linux kernel 2.4.27 packages fix several vulnerabilities |
Debian DSA |
DSA-1018-2 | New Linux kernel 2.4.27 packages fix several vulnerabilities |
EUVD |
EUVD-2004-2598 | A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:36:24.335Z
Reserved: 2005-12-02T00:00:00
Link: CVE-2004-2607
No data.
Status : Deferred
Published: 2004-12-31T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-2607
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD