CVE-2005-0767
https://notcve.org/view.php?id=CVE-2005-0767
Race condition in the Radeon DRI driver for Linux kernel 2.6.8.1 allows local users with DRI privileges to execute arbitrary code as root. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000945 http://www.redhat.com/support/errata/RHSA-2005-366.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10431 https://usn.ubuntu.com/95-1 https://access.redhat.com/security/cve/CVE-2005-0767 https://bugzilla.redhat.com/show_bug.cgi?id=1617581 •
CVE-2005-0736 – Linux Kernel 2.6.9 < 2.6.11 (RHEL 4) - 'SYS_EPoll_Wait' Local Integer Overflow / Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2005-0736
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events. • https://www.exploit-db.com/exploits/1397 https://www.exploit-db.com/exploits/25202 http://linux.bkbits.net:8080/linux-2.6/cset%40422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html%7CChangeSet%40-1d http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html http://www.novell.com/linux/security/advisories/2005_18_kernel.html http://www.redhat.com/support/errata/RHSA-2005-293.html http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.securityfocus.com/bid/12763& •
CVE-2005-0207
https://notcve.org/view.php?id=CVE-2005-0207
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.securityfocus.com/advisories/7880 http://www.securityfocus.com/bid/12330 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11001 https://access.redhat.com/security/cve/CVE-2005-0207 https://bugzilla.redhat.com/show_bug.cgi?id=1617494 •
CVE-2005-0529
https://notcve.org/view.php?id=CVE-2005-0529
Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%404201818eC6aMn0x3GY_9rw3ueb2ZWQ http://marc.info/?l=bugtraq&m=111091402626556&w=2 http://marc.info/?l=full-disclosure&m=110846727602817&w=2 http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html http://www.novell.com/linux/security/advisories/2005_18_kernel.html http://www.redhat.com/support/errata/RHSA-2005-366.html https://oval.cisecurity.org& •
CVE-2005-0530
https://notcve.org/view.php?id=CVE-2005-0530
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://linux.bkbits.net:8080/linux-2.6/cset%40420181322LZmhPTewcCOLkubGwOL3w http://marc.info/?l=bugtraq&m=111091402626556&w=2 http://marc.info/?l=full-disclosure&m=110846727602817&w=2 http://www.guninski.com/where_do_you_want_billg_to_go_today_3.html http://www.novell.com/linux/security/advisories/2005_18_kernel.html http://www.redhat.com/support/errata/RHSA-2005-366.html https://oval.cisecurity.org/ •