Vulnerabilities > Linux > Linux Kernel > 2.4.29

DATE CVE VULNERABILITY TITLE RISK
2005-03-14 CVE-2005-0504 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Linux Kernel
Buffer overflow in the MoxaDriverIoctl function for the moxa serial driver (moxa.c) in Linux 2.2.x, 2.4.x, and 2.6.x before 2.6.22 allows local users to execute arbitrary code via a certain modified length value.
local
low complexity
linux CWE-119
4.6
2005-03-07 CVE-2005-0179 Unspecified vulnerability in Linux Kernel
Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.
local
low complexity
linux
2.1
2004-12-31 CVE-2004-2731 Numeric Errors vulnerability in Linux Kernel
Multiple integer overflows in Sbus PROM driver (drivers/sbus/char/openprom.c) for the Linux kernel 2.4.x up to 2.4.27, 2.6.x up to 2.6.7, and possibly later versions, allow local users to execute arbitrary code by specifying (1) a small buffer size to the copyin_string function or (2) a negative buffer size to the copyin function.
local
linux CWE-189
4.4
2004-12-31 CVE-2004-2607 Unspecified vulnerability in Linux Kernel
A numeric casting discrepancy in sdla_xfer in Linux kernel 2.6.x up to 2.6.5 and 2.4 up to 2.4.29-rc1 allows local users to read portions of kernel memory via a large len argument, which is received as an int but cast to a short, which prevents a read loop from filling a buffer.
local
low complexity
linux
2.1
2004-12-23 CVE-2004-0816 Integer Underflow (Wrap or Wraparound) vulnerability in Linux Kernel
Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.
network
low complexity
linux CWE-191
7.5
2004-05-26 CVE-2004-2135 Information Disclosure vulnerability in Linux Kernel Cryptoloop
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
local
low complexity
linux
2.1