CVE-2005-3055

Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
References
Link Resource
http://marc.info/?l=linux-kernel&m=112766129313883 Mailing List
http://secunia.com/advisories/17826 Permissions Required Third Party Advisory
http://secunia.com/advisories/17917 Permissions Required Third Party Advisory
http://secunia.com/advisories/17918 Permissions Required Third Party Advisory
http://secunia.com/advisories/19374 Permissions Required Third Party Advisory
http://secunia.com/advisories/21035 Permissions Required Third Party Advisory
http://secunia.com/advisories/21136 Permissions Required Third Party Advisory
http://secunia.com/advisories/21465 Permissions Required Third Party Advisory
http://secunia.com/advisories/21983 Permissions Required Third Party Advisory
http://secunia.com/advisories/22417 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm Third Party Advisory
http://www.debian.org/security/2006/dsa-1017 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0437.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0575.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0579.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0580.html Not Applicable
http://www.securityfocus.com/advisories/9806 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/419522/100/0/threaded
http://www.securityfocus.com/bid/14955 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/1863 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472
https://usn.ubuntu.com/219-1/
http://marc.info/?l=linux-kernel&m=112766129313883 Mailing List
http://secunia.com/advisories/17826 Permissions Required Third Party Advisory
http://secunia.com/advisories/17917 Permissions Required Third Party Advisory
http://secunia.com/advisories/17918 Permissions Required Third Party Advisory
http://secunia.com/advisories/19374 Permissions Required Third Party Advisory
http://secunia.com/advisories/21035 Permissions Required Third Party Advisory
http://secunia.com/advisories/21136 Permissions Required Third Party Advisory
http://secunia.com/advisories/21465 Permissions Required Third Party Advisory
http://secunia.com/advisories/21983 Permissions Required Third Party Advisory
http://secunia.com/advisories/22417 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm Third Party Advisory
http://www.debian.org/security/2006/dsa-1017 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0437.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0575.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0579.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0580.html Not Applicable
http://www.securityfocus.com/advisories/9806 Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/419522/100/0/threaded
http://www.securityfocus.com/bid/14955 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2005/1863 Broken Link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472
https://usn.ubuntu.com/219-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://marc.info/?l=linux-kernel&m=112766129313883 - Mailing List () http://marc.info/?l=linux-kernel&m=112766129313883 - Mailing List
References () http://secunia.com/advisories/17826 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/17826 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/17917 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/17917 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/17918 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/17918 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/19374 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/19374 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/21035 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/21035 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/21136 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/21136 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/21465 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/21465 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/21983 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/21983 - Permissions Required, Third Party Advisory
References () http://secunia.com/advisories/22417 - Permissions Required, Third Party Advisory () http://secunia.com/advisories/22417 - Permissions Required, Third Party Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm - () http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm -
References () http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm - Third Party Advisory () http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm - Third Party Advisory
References () http://www.debian.org/security/2006/dsa-1017 - Third Party Advisory () http://www.debian.org/security/2006/dsa-1017 - Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 - Broken Link () http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 - () http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 - Broken Link () http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 - Broken Link
References () http://www.redhat.com/support/errata/RHSA-2006-0437.html - Not Applicable () http://www.redhat.com/support/errata/RHSA-2006-0437.html - Not Applicable
References () http://www.redhat.com/support/errata/RHSA-2006-0575.html - Not Applicable () http://www.redhat.com/support/errata/RHSA-2006-0575.html - Not Applicable
References () http://www.redhat.com/support/errata/RHSA-2006-0579.html - Not Applicable () http://www.redhat.com/support/errata/RHSA-2006-0579.html - Not Applicable
References () http://www.redhat.com/support/errata/RHSA-2006-0580.html - Not Applicable () http://www.redhat.com/support/errata/RHSA-2006-0580.html - Not Applicable
References () http://www.securityfocus.com/advisories/9806 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/advisories/9806 - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/archive/1/419522/100/0/threaded - () http://www.securityfocus.com/archive/1/419522/100/0/threaded -
References () http://www.securityfocus.com/bid/14955 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/14955 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2005/1863 - Broken Link () http://www.vupen.com/english/advisories/2005/1863 - Broken Link
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472 -
References () https://usn.ubuntu.com/219-1/ - () https://usn.ubuntu.com/219-1/ -

Information

Published : 2005-09-26 19:03

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3055

Mitre link : CVE-2005-3055

CVE.ORG link : CVE-2005-3055


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-20

Improper Input Validation