CVE-2005-0136

The Linux kernel before 2.6.11 on the Itanium IA64 platform has certain "ptrace corner cases" that allow local users to cause a denial of service (crash) via crafted syscalls, possibly related to MCA/INIT, a different vulnerability than CVE-2005-1761.
References
Link Resource
http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html
http://openvz.org/news/updates/kernel-022stab045.1-released Patch
http://secunia.com/advisories/17002 Patch Vendor Advisory
http://www.gelato.unsw.edu.au/archives/linux-ia64/0409/11073.html Patch
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11 Patch
http://www.redhat.com/support/errata/RHSA-2005-420.html Patch
http://www.redhat.com/support/errata/RHSA-2005-663.html Patch
http://www.vupen.com/english/advisories/2005/1878
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148862 Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=155283 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11628
http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html
http://openvz.org/news/updates/kernel-022stab045.1-released Patch
http://secunia.com/advisories/17002 Patch Vendor Advisory
http://www.gelato.unsw.edu.au/archives/linux-ia64/0409/11073.html Patch
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11 Patch
http://www.redhat.com/support/errata/RHSA-2005-420.html Patch
http://www.redhat.com/support/errata/RHSA-2005-663.html Patch
http://www.vupen.com/english/advisories/2005/1878
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148862 Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=155283 Patch
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11628
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*

History

20 Nov 2024, 23:54

Type Values Removed Values Added
References () http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html - () http://lists.alioth.debian.org/pipermail/kernel-svn-changes/2005-August/002597.html -
References () http://openvz.org/news/updates/kernel-022stab045.1-released - Patch () http://openvz.org/news/updates/kernel-022stab045.1-released - Patch
References () http://secunia.com/advisories/17002 - Patch, Vendor Advisory () http://secunia.com/advisories/17002 - Patch, Vendor Advisory
References () http://www.gelato.unsw.edu.au/archives/linux-ia64/0409/11073.html - Patch () http://www.gelato.unsw.edu.au/archives/linux-ia64/0409/11073.html - Patch
References () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11 - Patch () http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.11 - Patch
References () http://www.redhat.com/support/errata/RHSA-2005-420.html - Patch () http://www.redhat.com/support/errata/RHSA-2005-420.html - Patch
References () http://www.redhat.com/support/errata/RHSA-2005-663.html - Patch () http://www.redhat.com/support/errata/RHSA-2005-663.html - Patch
References () http://www.vupen.com/english/advisories/2005/1878 - () http://www.vupen.com/english/advisories/2005/1878 -
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148862 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=148862 - Patch
References () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=155283 - Patch () https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=155283 - Patch
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11628 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11628 -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-20 23:54


NVD link : CVE-2005-0136

Mitre link : CVE-2005-0136

CVE.ORG link : CVE-2005-0136


JSON object : View

Products Affected

linux

  • linux_kernel