CVE-2005-0179
https://notcve.org/view.php?id=CVE-2005-0179
Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030660.html http://secunia.com/advisories/17002 http://www.redhat.com/support/errata/RHSA-2005-092.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.vupen.com/english/advisories/2005/1878 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9890 https://access.redhat.com/security/cve/CVE-2005 •
CVE-2004-1057
https://notcve.org/view.php?id=CVE-2004-1057
Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages. • http://secunia.com/advisories/18562 http://www.kernel.org/pub/linux/kernel/people/andrea/kernels/v2.4/2.4.23aa3/00_VM_IO-4 http://www.redhat.com/support/errata/RHSA-2005-016.html http://www.redhat.com/support/errata/RHSA-2005-017.html http://www.redhat.com/support/errata/RHSA-2006-0140.html http://www.securityfocus.com/bid/12338 https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=137821 https://exchange.xforce.ibmcloud.com/vulnerabilities/19275 https://oval.cisec •
CVE-2005-0003
https://notcve.org/view.php?id=CVE-2005-0003
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. El soporte de ELF de 64 bits en los kernel de Linux 2.6 anteriores a 2.6.10 en arquitecturas de 64 bits no verifica adecuadamente solapamientos en asignaciones de memoria VMA (virtual memory address), lo que permite a usuarios locales causar una denegación de servicio (caída del sistema) o ejecutar código de su elección mediante un fichero ELF o a.out artesanal. • http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-LoPqkzKXudYby_3TUmg http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://securitytracker.com/id?1012885 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 •
CVE-2004-1237
https://notcve.org/view.php?id=CVE-2004-1237
Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors. Vulnerabilidad desconocida en el código de filtrado de llamada al sistema en el subsistema de auditoría de Red Hat Enterprise Linux 3 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante vectores de ataque desconocidos. • http://www.redhat.com/support/errata/RHSA-2005-043.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11282 https://access.redhat.com/security/cve/CVE-2004-1237 https://bugzilla.redhat.com/show_bug.cgi?id=1617399 •
CVE-2005-0124
https://notcve.org/view.php?id=CVE-2005-0124
The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow. La función coda_pioctl en Linux kernel 2.6.9 y 2.4.x anteriores a 2.4.29 puede permitir a usuarios locales causar una denegación de servicio (caída) o ejecutar código de su elección mediante valores vi.in_size o vi.out_size negativos, lo que puede disparar un desbordamiento de búfer. • http://seclists.org/lists/linux-kernel/2004/Dec/3914.html http://seclists.org/lists/linux-kernel/2005/Jan/1089.html http://seclists.org/lists/linux-kernel/2005/Jan/2018.html http://seclists.org/lists/linux-kernel/2005/Jan/2020.html http://secunia.com/advisories/17002 http://secunia.com/advisories/18684 http://secunia.com/advisories/19374 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://securitytracker. •