Vulnerabilities > Linux > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2005-01-27 | CVE-2004-0887 | Local Privilege Escalation vulnerability in Linux IBM S/390 Kernel SACF Instruction SUSE Linux Enterprise Server 9 on the S/390 platform does not properly handle a certain privileged instruction, which allows local users to gain root privileges. | 7.2 |
2005-01-21 | CVE-2004-1057 | Unspecified vulnerability in Linux Kernel Device Driver Virtual Memory Flags Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages. | 7.2 |
2005-01-10 | CVE-2004-1072 | Local Privilege Escalation vulnerability in Linux Kernel BINFMT_ELF Loader The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, may create an interpreter name string that is not NULL terminated, which could cause strings longer than PATH_MAX to be used, leading to buffer overflows that allow local users to cause a denial of service (hang) and possibly execute arbitrary code. | 7.2 |
2005-01-10 | CVE-2004-1071 | Local Privilege Escalation vulnerability in Linux Kernel BINFMT_ELF Loader The binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly handle a failed call to the mmap function, which causes an incorrect mapped image and may allow local users to execute arbitrary code. | 7.2 |
2005-01-10 | CVE-2004-1070 | Local Privilege Escalation vulnerability in Linux Kernel BINFMT_ELF Loader The load_elf_binary function in the binfmt_elf loader (binfmt_elf.c) in Linux kernel 2.4.x up to 2.4.27, and 2.6.x up to 2.6.8, does not properly check return values from calls to the kernel_read function, which may allow local users to modify sensitive memory in a setuid program and execute arbitrary code. | 7.2 |
2004-12-31 | CVE-2004-2536 | Local IO Access Inheritance vulnerability in Linux Kernel The exit_thread function (process.c) in Linux kernel 2.6 through 2.6.5 does not invalidate the per-TSS io_bitmap pointers if a process obtains IO access permissions from the ioperm function but does not drop those permissions when it exits, which allows other processes to access the per-TSS pointers, access restricted memory locations, and possibly gain privileges. | 7.5 |
2004-12-31 | CVE-2004-2013 | Integer Overflow or Wraparound vulnerability in Linux Kernel Integer overflow in the SCTP_SOCKOPT_DEBUG_NAME SCTP socket option in socket.c in the Linux kernel 2.4.25 and earlier allows local users to execute arbitrary code via an optlen value of -1, which causes kmalloc to allocate 0 bytes of memory. | 7.8 |
2004-12-31 | CVE-2004-1144 | Unspecified vulnerability in Linux Kernel 2.4.0 Unknown vulnerability in the 32bit emulation code in Linux 2.4 on AMD64 systems allows local users to gain privileges. | 7.2 |
2004-12-23 | CVE-2004-0816 | Integer Underflow (Wrap or Wraparound) vulnerability in Linux Kernel Integer underflow in the firewall logging rules for iptables in Linux before 2.6.8 allows remote attackers to cause a denial of service (application crash) via a malformed IP packet. | 7.5 |
2004-12-06 | CVE-2004-0496 | Multiple unknown vulnerabilities in Linux kernel 2.6 allow local users to gain privileges or access kernel memory, a different set of vulnerabilities than those identified in CVE-2004-0495, as found by the Sparse source code checking tool. | 7.2 |