Lucene search

K
nvd[email protected]NVD:CVE-2004-1057
HistoryJan 21, 2005 - 5:00 a.m.

CVE-2004-1057

2005-01-2105:00:00
web.nvd.nist.gov

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.3%

Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.

Affected configurations

NVD
Node
linuxlinux_kernelRange2.4.19
OR
linuxlinux_kernelMatch2.0
OR
linuxlinux_kernelMatch2.0.1
OR
linuxlinux_kernelMatch2.0.2
OR
linuxlinux_kernelMatch2.0.3
OR
linuxlinux_kernelMatch2.0.4
OR
linuxlinux_kernelMatch2.0.5
OR
linuxlinux_kernelMatch2.0.6
OR
linuxlinux_kernelMatch2.0.7
OR
linuxlinux_kernelMatch2.0.8
OR
linuxlinux_kernelMatch2.0.9
OR
linuxlinux_kernelMatch2.0.9.9
OR
linuxlinux_kernelMatch2.0.10
OR
linuxlinux_kernelMatch2.0.11
OR
linuxlinux_kernelMatch2.0.12
OR
linuxlinux_kernelMatch2.0.13
OR
linuxlinux_kernelMatch2.0.14
OR
linuxlinux_kernelMatch2.0.15
OR
linuxlinux_kernelMatch2.0.16
OR
linuxlinux_kernelMatch2.0.17
OR
linuxlinux_kernelMatch2.0.18
OR
linuxlinux_kernelMatch2.0.19
OR
linuxlinux_kernelMatch2.0.20
OR
linuxlinux_kernelMatch2.0.21
OR
linuxlinux_kernelMatch2.0.22
OR
linuxlinux_kernelMatch2.0.23
OR
linuxlinux_kernelMatch2.0.24
OR
linuxlinux_kernelMatch2.0.25
OR
linuxlinux_kernelMatch2.0.26
OR
linuxlinux_kernelMatch2.0.27
OR
linuxlinux_kernelMatch2.0.28
OR
linuxlinux_kernelMatch2.0.29
OR
linuxlinux_kernelMatch2.0.30
OR
linuxlinux_kernelMatch2.0.31
OR
linuxlinux_kernelMatch2.0.32
OR
linuxlinux_kernelMatch2.0.33
OR
linuxlinux_kernelMatch2.0.34
OR
linuxlinux_kernelMatch2.0.35
OR
linuxlinux_kernelMatch2.0.36
OR
linuxlinux_kernelMatch2.0.37
OR
linuxlinux_kernelMatch2.0.38
OR
linuxlinux_kernelMatch2.0.39
OR
linuxlinux_kernelMatch2.1
OR
linuxlinux_kernelMatch2.1.89
OR
linuxlinux_kernelMatch2.2.0
OR
linuxlinux_kernelMatch2.2.1
OR
linuxlinux_kernelMatch2.2.2
OR
linuxlinux_kernelMatch2.2.3
OR
linuxlinux_kernelMatch2.2.4
OR
linuxlinux_kernelMatch2.2.5
OR
linuxlinux_kernelMatch2.2.6
OR
linuxlinux_kernelMatch2.2.7
OR
linuxlinux_kernelMatch2.2.8
OR
linuxlinux_kernelMatch2.2.9
OR
linuxlinux_kernelMatch2.2.10
OR
linuxlinux_kernelMatch2.2.11
OR
linuxlinux_kernelMatch2.2.12
OR
linuxlinux_kernelMatch2.2.13
OR
linuxlinux_kernelMatch2.2.14
OR
linuxlinux_kernelMatch2.2.15
OR
linuxlinux_kernelMatch2.2.15pre16
OR
linuxlinux_kernelMatch2.2.15_pre20
OR
linuxlinux_kernelMatch2.2.16
OR
linuxlinux_kernelMatch2.2.16pre6
OR
linuxlinux_kernelMatch2.2.17
OR
linuxlinux_kernelMatch2.2.18
OR
linuxlinux_kernelMatch2.2.19
OR
linuxlinux_kernelMatch2.2.20
OR
linuxlinux_kernelMatch2.2.21
OR
linuxlinux_kernelMatch2.2.22
OR
linuxlinux_kernelMatch2.2.23
OR
linuxlinux_kernelMatch2.2.24
OR
linuxlinux_kernelMatch2.2.25
OR
linuxlinux_kernelMatch2.2.27rc2
OR
linuxlinux_kernelMatch2.3.0
OR
linuxlinux_kernelMatch2.3.99
OR
linuxlinux_kernelMatch2.3.99pre1
OR
linuxlinux_kernelMatch2.3.99pre2
OR
linuxlinux_kernelMatch2.3.99pre3
OR
linuxlinux_kernelMatch2.3.99pre4
OR
linuxlinux_kernelMatch2.3.99pre5
OR
linuxlinux_kernelMatch2.3.99pre6
OR
linuxlinux_kernelMatch2.3.99pre7
OR
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.0test1
OR
linuxlinux_kernelMatch2.4.0test10
OR
linuxlinux_kernelMatch2.4.0test11
OR
linuxlinux_kernelMatch2.4.0test12
OR
linuxlinux_kernelMatch2.4.0test2
OR
linuxlinux_kernelMatch2.4.0test3
OR
linuxlinux_kernelMatch2.4.0test4
OR
linuxlinux_kernelMatch2.4.0test5
OR
linuxlinux_kernelMatch2.4.0test6
OR
linuxlinux_kernelMatch2.4.0test7
OR
linuxlinux_kernelMatch2.4.0test8
OR
linuxlinux_kernelMatch2.4.0test9
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.18x86
OR
linuxlinux_kernelMatch2.4.18pre1
OR
linuxlinux_kernelMatch2.4.18pre2
OR
linuxlinux_kernelMatch2.4.18pre3
OR
linuxlinux_kernelMatch2.4.18pre4
OR
linuxlinux_kernelMatch2.4.18pre5
OR
linuxlinux_kernelMatch2.4.18pre6
OR
linuxlinux_kernelMatch2.4.18pre7
OR
linuxlinux_kernelMatch2.4.18pre8
OR
linuxlinux_kernelMatch2.4.19pre1
OR
linuxlinux_kernelMatch2.4.19pre2
OR
linuxlinux_kernelMatch2.4.19pre3
OR
linuxlinux_kernelMatch2.4.19pre4
OR
linuxlinux_kernelMatch2.4.19pre5
OR
linuxlinux_kernelMatch2.4.19pre6
OR
linuxlinux_kernelMatch2.6.20.1
OR
redhatenterprise_linuxMatch2.1advanced_server
OR
redhatenterprise_linuxMatch2.1advanced_server_ia64
OR
redhatenterprise_linuxMatch2.1enterprise_server
OR
redhatenterprise_linuxMatch2.1enterprise_server_ia64
OR
redhatenterprise_linuxMatch2.1workstation
OR
redhatenterprise_linuxMatch2.1workstation_ia64
OR
redhatenterprise_linuxMatch3.0advanced_servers
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation
OR
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.2 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

25.3%

Related for NVD:CVE-2004-1057