CVE-2005-3808

Integer overflow in the invalidate_inode_pages2_range function in mm/truncate.c in Linux kernel 2.6.11 to 2.6.14 allows local users to cause a denial of service (hang) via 64-bit mmap calls that are not properly handled on a 32-bit system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*

History

21 Nov 2024, 00:02

Type Values Removed Values Added
References () http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html - () http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html -
References () http://seclists.org/lists/linux-kernel/2005/Nov/7839.html - Patch, Vendor Advisory () http://seclists.org/lists/linux-kernel/2005/Nov/7839.html - Patch, Vendor Advisory
References () http://secunia.com/advisories/18203 - () http://secunia.com/advisories/18203 -
References () http://secunia.com/advisories/18788 - () http://secunia.com/advisories/18788 -
References () http://secunia.com/advisories/19038 - () http://secunia.com/advisories/19038 -
References () http://www.kernel.org/hg/linux-2.6/?cs=6d5ffbb49406 - Patch () http://www.kernel.org/hg/linux-2.6/?cs=6d5ffbb49406 - Patch
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:018 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:018 -
References () http://www.novell.com/linux/security/advisories/2006_06_kernel.html - () http://www.novell.com/linux/security/advisories/2006_06_kernel.html -
References () http://www.securityfocus.com/advisories/9852 - () http://www.securityfocus.com/advisories/9852 -
References () http://www.securityfocus.com/bid/15846 - () http://www.securityfocus.com/bid/15846 -
References () https://usn.ubuntu.com/231-1/ - () https://usn.ubuntu.com/231-1/ -

Information

Published : 2005-11-25 21:03

Updated : 2024-11-21 00:02


NVD link : CVE-2005-3808

Mitre link : CVE-2005-3808

CVE.ORG link : CVE-2005-3808


JSON object : View

Products Affected

linux

  • linux_kernel