2.1

CVE-2004-1016

Exploit

The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.

Data is provided by the National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.4.0
LinuxLinux Kernel Version2.4.0 Updatetest1
LinuxLinux Kernel Version2.4.0 Updatetest10
LinuxLinux Kernel Version2.4.0 Updatetest11
LinuxLinux Kernel Version2.4.0 Updatetest12
LinuxLinux Kernel Version2.4.0 Updatetest2
LinuxLinux Kernel Version2.4.0 Updatetest3
LinuxLinux Kernel Version2.4.0 Updatetest4
LinuxLinux Kernel Version2.4.0 Updatetest5
LinuxLinux Kernel Version2.4.0 Updatetest6
LinuxLinux Kernel Version2.4.0 Updatetest7
LinuxLinux Kernel Version2.4.0 Updatetest8
LinuxLinux Kernel Version2.4.0 Updatetest9
LinuxLinux Kernel Version2.4.1
LinuxLinux Kernel Version2.4.2
LinuxLinux Kernel Version2.4.3
LinuxLinux Kernel Version2.4.4
LinuxLinux Kernel Version2.4.5
LinuxLinux Kernel Version2.4.6
LinuxLinux Kernel Version2.4.7
LinuxLinux Kernel Version2.4.8
LinuxLinux Kernel Version2.4.9
LinuxLinux Kernel Version2.4.10
LinuxLinux Kernel Version2.4.11
LinuxLinux Kernel Version2.4.12
LinuxLinux Kernel Version2.4.13
LinuxLinux Kernel Version2.4.14
LinuxLinux Kernel Version2.4.15
LinuxLinux Kernel Version2.4.16
LinuxLinux Kernel Version2.4.17
LinuxLinux Kernel Version2.4.18
LinuxLinux Kernel Version2.4.18 Editionx86
LinuxLinux Kernel Version2.4.18 Updatepre1
LinuxLinux Kernel Version2.4.18 Updatepre2
LinuxLinux Kernel Version2.4.18 Updatepre3
LinuxLinux Kernel Version2.4.18 Updatepre4
LinuxLinux Kernel Version2.4.18 Updatepre5
LinuxLinux Kernel Version2.4.18 Updatepre6
LinuxLinux Kernel Version2.4.18 Updatepre7
LinuxLinux Kernel Version2.4.18 Updatepre8
LinuxLinux Kernel Version2.4.19
LinuxLinux Kernel Version2.4.19 Updatepre1
LinuxLinux Kernel Version2.4.19 Updatepre2
LinuxLinux Kernel Version2.4.19 Updatepre3
LinuxLinux Kernel Version2.4.19 Updatepre4
LinuxLinux Kernel Version2.4.19 Updatepre5
LinuxLinux Kernel Version2.4.19 Updatepre6
LinuxLinux Kernel Version2.4.20
LinuxLinux Kernel Version2.4.21
LinuxLinux Kernel Version2.4.21 Updatepre1
LinuxLinux Kernel Version2.4.21 Updatepre4
LinuxLinux Kernel Version2.4.21 Updatepre7
LinuxLinux Kernel Version2.4.22
LinuxLinux Kernel Version2.4.23
LinuxLinux Kernel Version2.4.23 Updatepre9
LinuxLinux Kernel Version2.4.23_ow2
LinuxLinux Kernel Version2.4.24
LinuxLinux Kernel Version2.4.24_ow1
LinuxLinux Kernel Version2.4.25
LinuxLinux Kernel Version2.4.26
LinuxLinux Kernel Version2.4.27
LinuxLinux Kernel Version2.4.27 Updatepre1
LinuxLinux Kernel Version2.4.27 Updatepre2
LinuxLinux Kernel Version2.4.27 Updatepre3
LinuxLinux Kernel Version2.4.27 Updatepre4
LinuxLinux Kernel Version2.4.27 Updatepre5
LinuxLinux Kernel Version2.4.28
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.2
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6_test9_cvs
UbuntuUbuntu Linux Version4.1 Editionia64
UbuntuUbuntu Linux Version4.1 Editionppc
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.32% 0.521
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 2.1 3.9 2.9
AV:L/AC:L/Au:N/C:N/I:N/A:P