![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1765
https://notcve.org/view.php?id=CVE-2005-1765
31 May 2005 — syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments. • http://secunia.com/advisories/18056 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1264
https://notcve.org/view.php?id=CVE-2005-1264
17 May 2005 — Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1589 – Linux Kernel 2.6.12-rc4 - 'ioctl_by_bdev' Local Denial of Service
https://notcve.org/view.php?id=CVE-2005-1589
17 May 2005 — The pkt_ioctl function in the pktcdvd block device ioctl handler (pktcdvd.c) in Linux kernel 2.6.12-rc4 and earlier calls the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space and allows local users to cause a denial of service and possibly execute arbitrary code, a similar vulnerability to CVE-2005-1264. • https://www.exploit-db.com/exploits/998 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1263 – Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2005-1263
11 May 2005 — The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1368
https://notcve.org/view.php?id=CVE-2005-1368
02 May 2005 — The key_user_lookup function in security/keys/key.c in Linux kernel 2.6.10 to 2.6.11.8 may allow attackers to cause a denial of service (oops) via SMP. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.8 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-1369
https://notcve.org/view.php?id=CVE-2005-1369
02 May 2005 — The (1) it87 and (2) via686a drivers in I2C for Linux 2.6.x before 2.6.11.8, and 2.6.12 before 2.6.12-rc2, create the sysfs "alarms" file with write permissions, which allows local users to cause a denial of service (CPU consumption) by attempting to write to the file, which does not have an associated store function. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.8 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0137
https://notcve.org/view.php?id=CVE-2005-0137
24 Apr 2005 — Linux kernel 2.6 on Itanium (ia64) architectures allows local users to cause a denial of service via a "missing Itanium syscall table entry." • http://www.redhat.com/support/errata/RHSA-2005-284.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0135
https://notcve.org/view.php?id=CVE-2005-0135
24 Apr 2005 — The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash). • http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0977
https://notcve.org/view.php?id=CVE-2005-0977
05 Apr 2005 — The shmem_nopage function in shmem.c for the tmpfs driver in Linux kernel 2.6 does not properly verify the address argument, which allows local users to cause a denial of service (kernel crash) via an invalid address. • http://linux.bkbits.net:8080/linux-2.6/cset%40420551fbRlv9-QG6Gw9Lw_bKVfPSsg •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2005-0400
https://notcve.org/view.php?id=CVE-2005-0400
05 Apr 2005 — The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block. • http://arkoon.net/advisories/ext2-make-empty-leak.txt •