Vulnerabilities > Linux > Linux Kernel > 2.5.30

DATE CVE VULNERABILITY TITLE RISK
2004-12-23 CVE-2004-0816 Integer Underflow (Wrap or Wraparound) vulnerability in Linux Kernel
Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet.
network
low complexity
linux CWE-191
7.5
2004-12-23 CVE-2004-0685 Information Disclosure vulnerability in Linux Kernel USB Driver Uninitialized Structure
Certain USB drivers in the Linux 2.4 kernel use the copy_to_user function on uninitialized structures, which could allow local users to obtain sensitive information by reading memory that was not cleared from previous usage.
local
low complexity
linux redhat trustix
4.6
2004-08-06 CVE-2004-0658 Unspecified vulnerability in Linux Kernel
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.
local
low complexity
linux
7.2
2004-05-26 CVE-2004-2135 Information Disclosure vulnerability in Linux Kernel Cryptoloop
cryptoloop on Linux kernel 2.6.x, when used on certain file systems with a block size 1024 or greater, has certain "IV computation" weaknesses that allow watermarked files to be detected without decryption.
local
low complexity
linux
2.1
2003-06-16 CVE-2003-0246 Unspecified vulnerability in Linux Kernel
The ioperm system call in Linux kernel 2.4.20 and earlier does not properly restrict privileges, which allows local users to gain read or write access to certain I/O ports.
local
low complexity
linux
3.6
2002-12-31 CVE-2002-2254 Permissions, Privileges, and Access Controls vulnerability in Linux Kernel
The experimental IP packet queuing feature in Netfilter / IPTables in Linux kernel 2.4 up to 2.4.19 and 2.5 up to 2.5.31, when a privileged process exits and network traffic is not being queued, may allow a later process with the same Process ID (PID) to access certain network traffic that would otherwise be restricted.
local
low complexity
linux CWE-264
2.1