Vulnerabilities > Linux > Linux Kernel > 2.4.10

DATE CVE VULNERABILITY TITLE RISK
2005-12-31 CVE-2005-4351 Local Security vulnerability in kernel
The securelevels implementation in FreeBSD 7.0 and earlier, OpenBSD up to 3.8, DragonFly up to 1.2, and Linux up to 2.6.15 allows root users to bypass immutable settings for files by mounting another filesystem that masks the immutable files while the system is running.
local
low complexity
dragonfly freebsd linux openbsd
4.3
2005-12-31 CVE-2005-0489 Local Denial of Service vulnerability in Linux Kernel Invalid Proc Memory Access
The /proc handling (proc/base.c) Linux kernel 2.4 before 2.4.17 allows local users to cause a denial of service via unknown vectors that cause an invalid access of free memory.
local
low complexity
linux
4.9
2005-12-22 CVE-2005-3660 Local Socket Buffer Memory Exhaustion Denial of Service vulnerability in Linux Kernel
Linux kernel 2.4 and 2.6 allows attackers to cause a denial of service (memory exhaustion and panic) by creating a large number of connected file descriptors or socketpairs and setting a large data transfer buffer, then preventing Linux from being able to finish the transfer by causing the process to become a zombie, or closing the file descriptor without closing an associated reference.
local
low complexity
linux
4.9
2005-11-20 CVE-2005-2709 Resource Management Errors vulnerability in Linux Kernel
The sysctl functionality (sysctl.c) in Linux kernel before 2.6.14.1 allows local users to cause a denial of service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table.
local
low complexity
linux CWE-399
4.6
2005-10-25 CVE-2005-2708 Resource Management Errors vulnerability in Linux Kernel
The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.
local
low complexity
linux CWE-399
2.1
2005-10-21 CVE-2005-3274 NULL Pointer Dereference vulnerability in multiple products
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
local
high complexity
linux debian CWE-476
4.7
2005-07-11 CVE-2005-1768 Local Buffer Overflow vulnerability in Linux Kernel IA32 ExecVE
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
local
high complexity
linux
3.7
2005-05-11 CVE-2005-1263 Local Buffer Overflow vulnerability in Linux Kernel ELF Core Dump
The elf_core_dump function in binfmt_elf.c for Linux kernel 2.x.x to 2.2.27-rc2, 2.4.x to 2.4.31-pre1, and 2.6.x to 2.6.12-rc4 allows local users to execute arbitrary code via an ELF binary that, in certain conditions involving the create_elf_tables function, causes a negative length argument to pass a signed integer comparison, leading to a buffer overflow.
local
low complexity
linux
7.2
2005-05-02 CVE-2005-0815 ISO9660 Filesystem Handling vulnerability in Linux Kernel
Multiple "range checking flaws" in the ISO9660 filesystem handler in Linux 2.6.11 and earlier may allow attackers to cause a denial of service or corrupt memory via a crafted filesystem.
network
low complexity
linux
6.4
2005-05-02 CVE-2005-0400 Unspecified vulnerability in Linux Kernel
The ext2_make_empty function call in the Linux kernel before 2.6.11.6 does not properly initialize memory when creating a block for a new directory entry, which allows local users to obtain potentially sensitive information by reading the block.
local
low complexity
linux
2.1