CVE-2005-2800 – Linux Kernel 2.6.x - SCSI ProcFS Denial of Service
https://notcve.org/view.php?id=CVE-2005-2800
06 Sep 2005 — Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error. • https://www.exploit-db.com/exploits/26248 • CWE-399: Resource Management Errors •
CVE-2005-2098
https://notcve.org/view.php?id=CVE-2005-2098
22 Aug 2005 — The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •
CVE-2005-2458
https://notcve.org/view.php?id=CVE-2005-2458
22 Aug 2005 — inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables". • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •
CVE-2005-2099
https://notcve.org/view.php?id=CVE-2005-2099
22 Aug 2005 — The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 • CWE-399: Resource Management Errors •
CVE-2005-2457
https://notcve.org/view.php?id=CVE-2005-2457
22 Aug 2005 — The driver for compressed ISO file systems (zisofs) in the Linux kernel before 2.6.12.5 allows local users and remote attackers to cause a denial of service (kernel crash) via a crafted compressed ISO file system. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 •
CVE-2005-2459
https://notcve.org/view.php?id=CVE-2005-2459
22 Aug 2005 — The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458. • http://bugs.gentoo.org/show_bug.cgi?id=94584 • CWE-476: NULL Pointer Dereference •
CVE-2005-2555
https://notcve.org/view.php?id=CVE-2005-2555
16 Aug 2005 — Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c. • http://secunia.com/advisories/17002 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2005-2553
https://notcve.org/view.php?id=CVE-2005-2553
12 Aug 2005 — The find_target function in ptrace32.c in the Linux kernel 2.4.x before 2.4.29 does not properly handle a NULL return value from another function, which allows local users to cause a denial of service (kernel crash/oops) by running a 32-bit ltrace program with the -i option on a 64-bit executable program. • http://linux.bkbits.net:8080/linux-2.4/cset%4041dd3455GwQPufrGvBJjcUOXQa3WXA •
CVE-2005-2500
https://notcve.org/view.php?id=CVE-2005-2500
08 Aug 2005 — Buffer overflow in the xdr_xcode_array2 function in xdr.c in Linux kernel 2.6.12, as used in SuSE Linux Enterprise Server 9, might allow remote attackers to cause a denial of service and possibly execute arbitrary code via crafted XDR data for the nfsacl protocol. Desbordamiento de búfer en la función xdr_xcode_array2 en xdr.c en el kernel de Linux 2.6.5 y anterirores podría permitir a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código de su elección mediante datos XDR artesa... • http://linux.bkbits.net:8080/linux-2.6/cset%4042b9c4fdYUuaq0joRUZi8W0Q-2hA1A •
CVE-2005-2456
https://notcve.org/view.php?id=CVE-2005-2456
04 Aug 2005 — Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array. Desbordamiento en el índice del array en la función xfrm_sk_policy_insert en xfrm_user.c en el kernel de Linux 2.6 permite que usuarios locales provoquen una denegación de servicio y posiblemente ejeucte... • http://secunia.com/advisories/16298 • CWE-667: Improper Locking •