CVE-2005-0400
https://notcve.org/view.php?id=CVE-2005-0400
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block. • http://arkoon.net/advisories/ext2-make-empty-leak.txt http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.6 http://marc.info/?l=bugtraq&m=111238764720696&w=2 http://secunia.com/advisories/14713 http://secunia.com/advisories/17002 http://secunia.com/advisories/18684 http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.redhat.com/support/errata/RHSA-2006-0190.html http://www.redhat. •
CVE-2005-0977
https://notcve.org/view.php?id=CVE-2005-0977
The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address. • http://linux.bkbits.net:8080/linux-2.6/cset%40420551fbRlv9-QG6Gw9Lw_bKVfPSsg http://lkml.org/lkml/2005/2/5/111 http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/bid/12970 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10400 https://usn.ubuntu.com/103-1 https://access.redhat.com/security/cve/CVE-2005-0977 https://bugzilla.redhat.com/s •
CVE-2005-0749
https://notcve.org/view.php?id=CVE-2005-0749
The load_elf_library in the Linux kernel before 2.6.11.6 allows local users to cause a denial of service (kernel crash) via a crafted ELF library or executable, which causes a free of an invalid pointer. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.6 http://secunia.com/advisories/14713 http://secunia.com/advisories/19607 http://www.redhat.com/support/errata/RHSA-2005-293.html http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.securityfocus.com/bid/12935 •
CVE-2005-0916 – Linux Kernel PPC64/IA64 (AIO) - Local Denial of Service
https://notcve.org/view.php?id=CVE-2005-0916
AIO in the Linux kernel 2.6.11 on the PPC64 or IA64 architectures with CONFIG_HUGETLB_PAGE enabled allows local users to cause a denial of service (system panic) via a process that executes the io_queue_init function but exits without running io_queue_release, which causes exit_aio and is_hugepage_only_range to fail. • https://www.exploit-db.com/exploits/911 http://groups-beta.google.com/group/linux.kernel/browse_thread/thread/13b43bd5783842f6/7ce3c5a514a497ab?q=io_queue_init&rnum=3#7ce3c5a514a497ab http://linux.bkbits.net:8080/linux-2.6/cset%404248c8c0es30_4YVdwa6vteKi7h_nw http://www.novell.com/linux/security/advisories/2005_50_kernel.html http://www.securityfocus.com/bid/12987 •
CVE-2005-0750 – Linux Kernel 2.4.x/2.6.x - BlueTooth Signed Buffer Index (PoC)
https://notcve.org/view.php?id=CVE-2005-0750
The bluez_sock_create function in the Bluetooth stack for Linux kernel 2.4.6 through 2.4.30-rc1 and 2.6 through 2.6.11.5 allows local users to gain privileges via (1) socket or (2) socketpair call with a negative protocol value. • https://www.exploit-db.com/exploits/25287 https://www.exploit-db.com/exploits/25288 https://www.exploit-db.com/exploits/25289 https://www.exploit-db.com/exploits/926 http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032913.html http://marc.info/?l=bugtraq&m=111204562102633&w=2 http://www.redhat.com/support/errata/RHSA-2005-283.html http://www.redhat.com/support/errata/RHSA-2005-284.html http://www.redhat.com/support/errata/RHSA-2005-293.html http:& •