Certain operations in Linux kernel before 2.2.19 on the x86 architecture copy the wrong number of bytes, which might allow attackers to modify memory, aka "User access asm bug on x86."
References
Configurations
History
20 Nov 2024, 23:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=98575345009963&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=98637996127004&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=98653252326445&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=98684172109474&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=98759029811377&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=98775114228203&w=2 - | |
References | () http://marc.info/?l=bugtraq&m=99013830726309&w=2 - | |
References | () http://www.linux.org.uk/VERSION/relnotes.2219.html - | |
References | () http://www.redhat.com/support/errata/RHSA-2001-047.html - Patch, Vendor Advisory | |
References | () https://www.debian.org/security/2001/dsa-047 - |
Information
Published : 2001-04-17 04:00
Updated : 2024-11-20 23:37
NVD link : CVE-2001-1399
Mitre link : CVE-2001-1399
CVE.ORG link : CVE-2001-1399
JSON object : View
Products Affected
linux
- linux_kernel
CWE