CVE-2005-0207
https://notcve.org/view.php?id=CVE-2005-0207
Unknown vulnerability in Linux kernel 2.4.x, 2.5.x, and 2.6.x allows NFS clients to cause a denial of service via O_DIRECT. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000930 http://www.redhat.com/support/errata/RHSA-2005-366.html http://www.securityfocus.com/advisories/7880 http://www.securityfocus.com/bid/12330 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11001 https://access.redhat.com/security/cve/CVE-2005-0207 https://bugzilla.redhat.com/show_bug.cgi?id=1617494 •
CVE-2005-0003
https://notcve.org/view.php?id=CVE-2005-0003
The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. El soporte de ELF de 64 bits en los kernel de Linux 2.6 anteriores a 2.6.10 en arquitecturas de 64 bits no verifica adecuadamente solapamientos en asignaciones de memoria VMA (virtual memory address), lo que permite a usuarios locales causar una denegación de servicio (caída del sistema) o ejecutar código de su elección mediante un fichero ELF o a.out artesanal. • http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw http://linux.bkbits.net:8080/linux-2.6/cset%4041a6721cce-LoPqkzKXudYby_3TUmg http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://securitytracker.com/id?1012885 http://www.debian.org/security/2006/dsa-1067 http://www.debian.org/security/2006/dsa-1069 http://www.debian.org/security/2006/dsa-1070 http://www.debian.org/security/2006/dsa-1082 •
CVE-2004-1237
https://notcve.org/view.php?id=CVE-2004-1237
Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors. Vulnerabilidad desconocida en el código de filtrado de llamada al sistema en el subsistema de auditoría de Red Hat Enterprise Linux 3 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante vectores de ataque desconocidos. • http://www.redhat.com/support/errata/RHSA-2005-043.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11282 https://access.redhat.com/security/cve/CVE-2004-1237 https://bugzilla.redhat.com/show_bug.cgi?id=1617399 •
CVE-2004-0812
https://notcve.org/view.php?id=CVE-2004-0812
Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code. Vulnerabilidad desconocida en los kernel de Linux anteriores a 2.4.23 sobre las arquitecturas AMD64 Y EMT64, asociada con "establecimiento de límites TSS", permite a usuarios locales causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección. • http://linux.bkbits.net:8080/linux-2.6/cset%403fad673ber4GuU7iWppydzNIyLntEQ http://secunia.com/advisories/13359 http://www.ciac.org/ciac/bulletins/p-047.shtml http://www.redhat.com/support/errata/RHSA-2004-549.html http://www.securityfocus.com/bid/11794 https://exchange.xforce.ibmcloud.com/vulnerabilities/18346 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11375 https://access.redhat.com/security/cve/CVE-2004-0812 https://bugzilla.redhat.com/show_ •
CVE-2005-0001
https://notcve.org/view.php?id=CVE-2005-0001
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 http://isec.pl/vulnerabilities/isec-0022-pagefault.txt http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html http://marc.info/?l=bugtraq&m=110554694522719&w=2 http://marc.info/?l=bugtraq&m=110581146702951&w=2 http://secunia.com/advisories/13822 http://secunia.com/advisories/20163 http://secunia.com/advisories/20202 http://secunia.com/advisories/20338 http://securitytracker.com/id •