CVE-2005-0135

The unw_unwind_to_user function in unwind.c on Itanium (ia64) architectures in Linux kernel 2.6 allows local users to cause a denial of service (system crash).
References
Link Resource
http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg
http://secunia.com/advisories/15019 Patch Vendor Advisory
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2005-284.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-293.html
http://www.redhat.com/support/errata/RHSA-2005-366.html Patch Vendor Advisory
http://www.securityfocus.com/bid/13266
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148868 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040
http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg
http://secunia.com/advisories/15019 Patch Vendor Advisory
http://secunia.com/advisories/20163
http://secunia.com/advisories/20202
http://secunia.com/advisories/20338
http://www.debian.org/security/2006/dsa-1067
http://www.debian.org/security/2006/dsa-1069
http://www.debian.org/security/2006/dsa-1070
http://www.debian.org/security/2006/dsa-1082
http://www.redhat.com/support/errata/RHSA-2005-284.html Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2005-293.html
http://www.redhat.com/support/errata/RHSA-2005-366.html Patch Vendor Advisory
http://www.securityfocus.com/bid/13266
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148868 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg - () http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg -
References () http://secunia.com/advisories/15019 - Patch, Vendor Advisory () http://secunia.com/advisories/15019 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20163 - () http://secunia.com/advisories/20163 -
References () http://secunia.com/advisories/20202 - () http://secunia.com/advisories/20202 -
References () http://secunia.com/advisories/20338 - () http://secunia.com/advisories/20338 -
References () http://www.debian.org/security/2006/dsa-1067 - () http://www.debian.org/security/2006/dsa-1067 -
References () http://www.debian.org/security/2006/dsa-1069 - () http://www.debian.org/security/2006/dsa-1069 -
References () http://www.debian.org/security/2006/dsa-1070 - () http://www.debian.org/security/2006/dsa-1070 -
References () http://www.debian.org/security/2006/dsa-1082 - () http://www.debian.org/security/2006/dsa-1082 -
References () http://www.redhat.com/support/errata/RHSA-2005-284.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-284.html - Patch, Vendor Advisory
References () http://www.redhat.com/support/errata/RHSA-2005-293.html - () http://www.redhat.com/support/errata/RHSA-2005-293.html -
References () http://www.redhat.com/support/errata/RHSA-2005-366.html - Patch, Vendor Advisory () http://www.redhat.com/support/errata/RHSA-2005-366.html - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/13266 - () http://www.securityfocus.com/bid/13266 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148868 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148868 - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9040 -

07 Nov 2023, 01:57

Type Values Removed Values Added
References
  • {'url': 'http://linux.bkbits.net:8080/linux-2.6/cset@41f2beablXVnAs_6fznhhITh1j5hZg', 'name': 'http://linux.bkbits.net:8080/linux-2.6/cset@41f2beablXVnAs_6fznhhITh1j5hZg', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://linux.bkbits.net:8080/linux-2.6/cset%4041f2beablXVnAs_6fznhhITh1j5hZg -

Information

Published : 2005-05-02 04:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0135

Mitre link : CVE-2005-0135

CVE.ORG link : CVE-2005-0135


JSON object : View

Products Affected

linux

  • linux_kernel