CVE-2005-0001

Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
References
Link Resource
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
http://isec.pl/vulnerabilities/isec-0022-pagefault.txt
http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html
http://marc.info/?l=bugtraq&m=110554694522719&w=2
http://marc.info/?l=bugtraq&m=110581146702951&w=2
http://secunia.com/advisories/13822
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://securitytracker.com/id?1012862
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://www.redhat.com/support/errata/RHSA-2005-043.html
http://www.redhat.com/support/errata/RHSA-2005-092.html
http://www.securityfocus.com/bid/12244
http://www.trustix.org/errata/2005/0001/
https://bugzilla.fedora.us/show_bug.cgi?id=2336
https://exchange.xforce.ibmcloud.com/vulnerabilities/18849
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
http://isec.pl/vulnerabilities/isec-0022-pagefault.txt
http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html
http://marc.info/?l=bugtraq&m=110554694522719&w=2
http://marc.info/?l=bugtraq&m=110581146702951&w=2
http://secunia.com/advisories/13822
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://securitytracker.com/id?1012862
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.mandriva.com/security/advisories?name=MDKSA-2005:022
http://www.redhat.com/support/errata/RHSA-2005-016.html
http://www.redhat.com/support/errata/RHSA-2005-017.html
http://www.redhat.com/support/errata/RHSA-2005-043.html
http://www.redhat.com/support/errata/RHSA-2005-092.html
http://www.securityfocus.com/bid/12244
http://www.trustix.org/errata/2005/0001/
https://bugzilla.fedora.us/show_bug.cgi?id=2336
https://exchange.xforce.ibmcloud.com/vulnerabilities/18849
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.1:*:*:*:*:*:*:*
cpe:2.3:o:trustix:secure_linux:2.2:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 - () http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 -
References () http://isec.pl/vulnerabilities/isec-0022-pagefault.txt - () http://isec.pl/vulnerabilities/isec-0022-pagefault.txt -
References () http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html -
References () http://marc.info/?l=bugtraq&m=110554694522719&w=2 - () http://marc.info/?l=bugtraq&m=110554694522719&w=2 -
References () http://marc.info/?l=bugtraq&m=110581146702951&w=2 - () http://marc.info/?l=bugtraq&m=110581146702951&w=2 -
References () http://secunia.com/advisories/13822 - () http://secunia.com/advisories/13822 -
References () http://secunia.com/advisories/20163 - () http://secunia.com/advisories/20163 -
References () http://secunia.com/advisories/20202 - () http://secunia.com/advisories/20202 -
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://securitytracker.com/id?1012862 - () http://securitytracker.com/id?1012862 -
References () http://www.debian.org/security/2006/dsa-1067 - () http://www.debian.org/security/2006/dsa-1067 -
References () http://www.debian.org/security/2006/dsa-1069 - () http://www.debian.org/security/2006/dsa-1069 -
References () http://www.debian.org/security/2006/dsa-1070 - () http://www.debian.org/security/2006/dsa-1070 -
References () http://www.debian.org/security/2006/dsa-1082 - () http://www.debian.org/security/2006/dsa-1082 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:022 -
References () http://www.redhat.com/support/errata/RHSA-2005-016.html - () http://www.redhat.com/support/errata/RHSA-2005-016.html -
References () http://www.redhat.com/support/errata/RHSA-2005-017.html - () http://www.redhat.com/support/errata/RHSA-2005-017.html -
References () http://www.redhat.com/support/errata/RHSA-2005-043.html - () http://www.redhat.com/support/errata/RHSA-2005-043.html -
References () http://www.redhat.com/support/errata/RHSA-2005-092.html - () http://www.redhat.com/support/errata/RHSA-2005-092.html -
References () http://www.securityfocus.com/bid/12244 - () http://www.securityfocus.com/bid/12244 -
References () http://www.trustix.org/errata/2005/0001/ - () http://www.trustix.org/errata/2005/0001/ -
References () https://bugzilla.fedora.us/show_bug.cgi?id=2336 - () https://bugzilla.fedora.us/show_bug.cgi?id=2336 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/18849 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/18849 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322 -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0001

Mitre link : CVE-2005-0001

CVE.ORG link : CVE-2005-0001


JSON object : View

Products Affected

trustix

  • secure_linux

redhat

  • enterprise_linux
  • enterprise_linux_desktop

linux

  • linux_kernel