
CVE-2005-0204
https://notcve.org/view.php?id=CVE-2005-0204
21 Feb 2005 — Linux kernel before 2.6.9, when running on the AMD64 and Intel EM64T architectures, allows local users to write to privileged IO ports via the OUTS instruction. • http://secunia.com/advisories/18784 •

CVE-2005-0449
https://notcve.org/view.php?id=CVE-2005-0449
16 Feb 2005 — The netfilter/iptables module in Linux before 2.6.8.1 allows remote attackers to cause a denial of service (kernel crash) or bypass firewall rules via crafted packets, which are not properly handled by the skb_checksum_help function. • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U • CWE-20: Improper Input Validation •

CVE-2005-0177 – Ubuntu Security Notice 82-1
https://notcve.org/view.php?id=CVE-2005-0177
16 Feb 2005 — nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow. The Linux kernel suffers from various flaws. Michael Kerrisk noticed insufficient permission checking in the shmctl() function. OGAWA Hirofumi noticed that the table sizes in nls_ascii.c were incorrectly set to 128 instead of 256. This caused a buffer overflow in some cases which could be exploited to crash the kernel. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2005-0178 – Ubuntu Security Notice 82-1
https://notcve.org/view.php?id=CVE-2005-0178
16 Feb 2005 — Race condition in the setsid function in Linux before 2.6.8.1 allows local users to cause a denial of service (crash) and possibly access portions of kernel memory, related to TTY changes, locking, and semaphores. The Linux kernel suffers from various flaws. Michael Kerrisk noticed insufficient permission checking in the shmctl() function. OGAWA Hirofumi noticed that the table sizes in nls_ascii.c were incorrectly set to 128 instead of 256. This caused a buffer overflow in some cases which could be exploite... • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVE-2005-0176 – Ubuntu Security Notice 82-1
https://notcve.org/view.php?id=CVE-2005-0176
15 Feb 2005 — The shmctl function in Linux 2.6.9 and earlier allows local users to unlock the memory of other processes, which could cause sensitive memory to be swapped to disk, which could allow it to be read by other users once it has been released. The Linux kernel suffers from various flaws. Michael Kerrisk noticed insufficient permission checking in the shmctl() function. OGAWA Hirofumi noticed that the table sizes in nls_ascii.c were incorrectly set to 128 instead of 256. This caused a buffer overflow in some case... • ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U •

CVE-2005-0179
https://notcve.org/view.php?id=CVE-2005-0179
06 Feb 2005 — Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVE-2005-0180
https://notcve.org/view.php?id=CVE-2005-0180
06 Feb 2005 — Multiple integer signedness errors in the sg_scsi_ioctl function in scsi_ioctl.c for Linux 2.6.x allow local users to read or modify kernel memory via negative integers in arguments to the scsi ioctl, which bypass a maximum length check before calling the copy_from_user and copy_to_user functions. • http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 •

CVE-2004-1057
https://notcve.org/view.php?id=CVE-2004-1057
21 Jan 2005 — Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages. • http://secunia.com/advisories/18562 •

CVE-2005-0003
https://notcve.org/view.php?id=CVE-2005-0003
20 Jan 2005 — The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file. El soporte de ELF de 64 bits en los kernel de Linux 2.6 anteriores a 2.6.10 en arquitecturas de 64 bits no verifica adecuadamente solapamientos en asignaciones de memoria VMA (virtual memory address), lo que permite a u... • http://linux.bkbits.net:8080/linux-2.4/cset%4041c36fb6q1Z68WUzKQFjJR-40Ev3tw •

CVE-2004-0812
https://notcve.org/view.php?id=CVE-2004-0812
20 Jan 2005 — Unknown vulnerability in the Linux kernel before 2.4.23, on the AMD AMD64 and Intel EM64T architectures, associated with "setting up TSS limits," allows local users to cause a denial of service (crash) and possibly execute arbitrary code. Vulnerabilidad desconocida en los kernel de Linux anteriores a 2.4.23 sobre las arquitecturas AMD64 Y EMT64, asociada con "establecimiento de límites TSS", permite a usuarios locales causar una denegación de servicio (caída) y posiblemente ejecutar código de su elección. • http://linux.bkbits.net:8080/linux-2.6/cset%403fad673ber4GuU7iWppydzNIyLntEQ •