CVE-2005-0124

The coda_pioctl function in the coda functionality (pioctl.c) for Linux kernel 2.6.9 and 2.4.x before 2.4.29 may allow local users to cause a denial of service (crash) or execute arbitrary code via negative vi.in_size or vi.out_size values, which may trigger a buffer overflow.
References
Link Resource
http://seclists.org/lists/linux-kernel/2004/Dec/3914.html
http://seclists.org/lists/linux-kernel/2005/Jan/1089.html
http://seclists.org/lists/linux-kernel/2005/Jan/2018.html Vendor Advisory
http://seclists.org/lists/linux-kernel/2005/Jan/2020.html
http://secunia.com/advisories/17002
http://secunia.com/advisories/18684
http://secunia.com/advisories/19374
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://securitytracker.com/id?1013018
http://www.debian.org/security/2006/dsa-1017
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/bid/14967
http://www.vupen.com/english/advisories/2005/1878
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11690
http://seclists.org/lists/linux-kernel/2004/Dec/3914.html
http://seclists.org/lists/linux-kernel/2005/Jan/1089.html
http://seclists.org/lists/linux-kernel/2005/Jan/2018.html Vendor Advisory
http://seclists.org/lists/linux-kernel/2005/Jan/2020.html
http://secunia.com/advisories/17002
http://secunia.com/advisories/18684
http://secunia.com/advisories/19374
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://securitytracker.com/id?1013018
http://www.debian.org/security/2006/dsa-1017
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2005-663.html
http://www.redhat.com/support/errata/RHSA-2006-0191.html
http://www.securityfocus.com/archive/1/428028/100/0/threaded
http://www.securityfocus.com/bid/14967
http://www.vupen.com/english/advisories/2005/1878
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11690
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:pre10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://seclists.org/lists/linux-kernel/2004/Dec/3914.html - () http://seclists.org/lists/linux-kernel/2004/Dec/3914.html -
References () http://seclists.org/lists/linux-kernel/2005/Jan/1089.html - () http://seclists.org/lists/linux-kernel/2005/Jan/1089.html -
References () http://seclists.org/lists/linux-kernel/2005/Jan/2018.html - Vendor Advisory () http://seclists.org/lists/linux-kernel/2005/Jan/2018.html - Vendor Advisory
References () http://seclists.org/lists/linux-kernel/2005/Jan/2020.html - () http://seclists.org/lists/linux-kernel/2005/Jan/2020.html -
References () http://secunia.com/advisories/17002 - () http://secunia.com/advisories/17002 -
References () http://secunia.com/advisories/18684 - () http://secunia.com/advisories/18684 -
References () http://secunia.com/advisories/19374 - () http://secunia.com/advisories/19374 -
References () http://secunia.com/advisories/20163 - () http://secunia.com/advisories/20163 -
References () http://secunia.com/advisories/20202 - () http://secunia.com/advisories/20202 -
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://securitytracker.com/id?1013018 - () http://securitytracker.com/id?1013018 -
References () http://www.debian.org/security/2006/dsa-1017 - () http://www.debian.org/security/2006/dsa-1017 -
References () http://www.debian.org/security/2006/dsa-1067 - () http://www.debian.org/security/2006/dsa-1067 -
References () http://www.debian.org/security/2006/dsa-1069 - () http://www.debian.org/security/2006/dsa-1069 -
References () http://www.debian.org/security/2006/dsa-1070 - () http://www.debian.org/security/2006/dsa-1070 -
References () http://www.debian.org/security/2006/dsa-1082 - () http://www.debian.org/security/2006/dsa-1082 -
References () http://www.redhat.com/support/errata/RHSA-2005-663.html - () http://www.redhat.com/support/errata/RHSA-2005-663.html -
References () http://www.redhat.com/support/errata/RHSA-2006-0191.html - () http://www.redhat.com/support/errata/RHSA-2006-0191.html -
References () http://www.securityfocus.com/archive/1/428028/100/0/threaded - () http://www.securityfocus.com/archive/1/428028/100/0/threaded -
References () http://www.securityfocus.com/bid/14967 - () http://www.securityfocus.com/bid/14967 -
References () http://www.vupen.com/english/advisories/2005/1878 - () http://www.vupen.com/english/advisories/2005/1878 -
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11690 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11690 -

Information

Published : 2005-04-14 04:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0124

Mitre link : CVE-2005-0124

CVE.ORG link : CVE-2005-0124


JSON object : View

Products Affected

linux

  • linux_kernel