Integer overflow in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (kernel crash) via a cmsg_len that contains a -1, which leads to a buffer overflow.
                
            Metrics
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
        
        AV:L/AC:L/Au:N/C:N/I:N/A:P
    
This CVE is not in the KEV list.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products | 
|---|---|
| Linux | 
                        
  | 
                
| Redhat | 
                        
  | 
                
Configuration 1 [-]
                        
                        
  | 
                
No data.
References
        History
                    No history.
Status: PUBLISHED
Assigner: mitre
Published: 2005-01-06T05:00:00
Updated: 2024-08-08T00:46:12.329Z
Reserved: 2005-01-06T00:00:00
Link: CVE-2004-1334
No data.
Status : Deferred
Published: 2004-12-15T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2004-1334
No data.
ReportizFlow