CVE-2005-0756
https://notcve.org/view.php?id=CVE-2005-0756
ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash). • http://secunia.com/advisories/17002 http://secunia.com/advisories/17073 http://secunia.com/advisories/18056 http://secunia.com/advisories/18059 http://www.debian.org/security/2005/dsa-921 http://www.debian.org/security/2005/dsa-922 http://www.redhat.com/support/errata/RHSA-2005-514.html http://www.redhat.com/support/errata/RHSA-2005-663.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/archive/1/428058/100/0/threaded • CWE-399: Resource Management Errors •
CVE-2005-1765
https://notcve.org/view.php?id=CVE-2005-1765
syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments. • http://secunia.com/advisories/18056 http://www.debian.org/security/2005/dsa-922 http://www.novell.com/linux/security/advisories/2005_29_kernel.html http://www.securityfocus.com/bid/13904 https://usn.ubuntu.com/143-1 •
CVE-2005-1589 – Linux Kernel 2.6.12-rc4 - 'ioctl_by_bdev' Local Denial of Service
https://notcve.org/view.php?id=CVE-2005-1589
The pkt_ioctl function in the pktcdvd block device ioctl handler (pktcdvd.c) in Linux kernel 2.6.12-rc4 and earlier calls the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space and allows local users to cause a denial of service and possibly execute arbitrary code, a similar vulnerability to CVE-2005-1264. • https://www.exploit-db.com/exploits/998 http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0046.html http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0047.html http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.10 http://marc.info/?l=linux-kernel&m=111630531515901&w=2 http://secunia.com/advisories/17826 http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 http://www.securit •
CVE-2005-1264
https://notcve.org/view.php?id=CVE-2005-1264
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589. • http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0045.html http://archives.neohapsis.com/archives/vulnwatch/2005-q2/0046.html http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11.10 http://marc.info/?l=linux-kernel&m=111630512512222 http://www.redhat.com/support/errata/RHSA-2005-420.html http://www.securityfocus.com/archive/1/427980/100/0/threaded http://www.securityfocus.com/bid/13651 http://www.vupen.com/english/advisories/2005/0557 https://oval.cisec •
CVE-2005-1263 – Linux Kernel 2.2.x/2.3.x/2.4.x/2.5.x/2.6.x - ELF Core Dump Local Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2005-1263
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow. • https://www.exploit-db.com/exploits/25647 ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U http://secunia.com/advisories/19185 http://secunia.com/advisories/19607 http://www.isec.pl/vulnerabilities/isec-0023-coredump.txt http://www.redhat.com/support/errata/RHSA-2005-472.html http://www.redhat.com/support/errata/RHSA-2005-529.html http://www.redhat.com/support/errata/RHSA-2005-551.html http://www.securityfocus.com/archive/1/397966 http://www.secur •