Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:11917
[Rus]
Version
3
Class
patch
ALTXid
134821
Language
English
Severity
NotAvailable
Title
DSA-922-1 -- kernel-source-2.6.8 -- several vulnerabilities
Description
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code.
Family
unix
Platform
Debian GNU/Linux 3.1
Product
kernel-source-2.6.8
Reference
VENDOR: DSA-922-1
VENDOR: DSA-922-1
Id:
DSA-922-1
Reference:
https://www.debian.org/security/2005/dsa-922
CVE: CVE-2004-2302
CVE: CVE-2004-2302
Id:
CVE-2004-2302
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-2302
Comment
: Race condition in the sysfs_read_file and sysfs_write_file functions in Linux kernel before 2.6.10 allows local users to read kernel memory and cause a denial of service (crash) via large offsets in sysfs files.
CVSSv2 Score:
2.6
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:P/I:N/A:P
CWE:
CWE-Other ()
References:
http://kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.10-rc1/2.6.10-rc1-mm1/broken-out/fix-race-in-sysfs_read_file-and-sysfs_write_file.patch (CONFIRM)
http://linux.bkbits.net:8080/linux-2.6/cset%404186a4deVoR88JjTwMa3ZnIp-_YJsA (CONFIRM)
17826 (SECUNIA)
18056 (SECUNIA)
DSA-922 (DEBIAN)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
SUSE-SA:2005:044 (SUSE)
13091 (BID)
CVE: CVE-2005-0756
CVE: CVE-2005-0756
Id:
CVE-2005-0756
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0756
Comment
: ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
17002 (SECUNIA)
17073 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
DSA-921 (DEBIAN)
DSA-922 (DEBIAN)
RHSA-2005:514 (REDHAT)
RHSA-2005:663 (REDHAT)
FLSA:157459-3 (FEDORA)
FLSA:157459-2 (FEDORA)
13891 (BID)
ADV-2005-1878 (VUPEN)
oval:org.mitre.oval:def:11119 (OVAL)
USN-137-1 (UBUNTU)
CVE: CVE-2005-0757
CVE: CVE-2005-0757
Id:
CVE-2005-0757
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0757
Comment
: The xattr file system code, as backported in Red Hat Enterprise Linux 3 on 64-bit systems, does not properly handle certain offsets, which allows local users to cause a denial of service (system crash) via certain actions on an ext3 file system with extended attributes enabled.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
18056 (SECUNIA)
18059 (SECUNIA)
DSA-921 (DEBIAN)
DSA-922 (DEBIAN)
RHSA-2005:294 (REDHAT)
13680 (BID)
oval:org.mitre.oval:def:11406 (OVAL)
CVE: CVE-2005-1265
CVE: CVE-2005-1265
Id:
CVE-2005-1265
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1265
Comment
: The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
17073 (SECUNIA)
18056 (SECUNIA)
1014152 (SECTRACK)
DSA-922 (DEBIAN)
RHSA-2005:514 (REDHAT)
FLSA:157459-3 (FEDORA)
13893 (BID)
oval:org.mitre.oval:def:10466 (OVAL)
USN-137-1 (UBUNTU)
CVE: CVE-2005-1761
CVE: CVE-2005-1761
Id:
CVE-2005-1761
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1761
Comment
: Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
20 (Improper Input Validation)
References:
SUSE-SA:2005:044 (SUSE)
DSA-922 (DEBIAN)
14051 (BID)
18056 (SECUNIA)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.1 (CONFIRM)
1014275 (SECTRACK)
RHSA-2005:514 (REDHAT)
RHSA-2005:551 (REDHAT)
RHSA-2005:663 (REDHAT)
17073 (SECUNIA)
DSA-1018 (DEBIAN)
19369 (SECUNIA)
17002 (SECUNIA)
ADV-2005-1878 (VUPEN)
oval:org.mitre.oval:def:10487 (OVAL)
FLSA:157459-3 (FEDORA)
http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4ea78729b8dbfc400fe165a57b90a394a7275a54 (MISC)
CVE: CVE-2005-1762
CVE: CVE-2005-1762
Id:
CVE-2005-1762
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1762
Comment
: The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a "non-canonical" address.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
15786 (SECUNIA)
17002 (SECUNIA)
17073 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
DSA-921 (DEBIAN)
DSA-922 (DEBIAN)
SUSE-SA:2005:029 (SUSE)
RHSA-2005:514 (REDHAT)
RHSA-2005:663 (REDHAT)
FLSA:157459-3 (FEDORA)
FLSA:157459-2 (FEDORA)
13904 (BID)
ADV-2005-1878 (VUPEN)
oval:org.mitre.oval:def:10630 (OVAL)
USN-143-1 (UBUNTU)
CVE: CVE-2005-1763
CVE: CVE-2005-1763
Id:
CVE-2005-1763
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1763
Comment
: Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.
CVSSv2 Score:
7.2
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:C/A:C
CWE:
CWE-Other ()
References:
17073 (SECUNIA)
18056 (SECUNIA)
DSA-922 (DEBIAN)
SUSE-SA:2005:029 (SUSE)
RHSA-2005:514 (REDHAT)
FLSA:157459-3 (FEDORA)
13903 (BID)
oval:org.mitre.oval:def:10182 (OVAL)
CVE: CVE-2005-1765
CVE: CVE-2005-1765
Id:
CVE-2005-1765
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1765
Comment
: syscall in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform, when running in 32-bit compatibility mode, allows local users to cause a denial of service (kernel hang) via crafted arguments.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
18056 (SECUNIA)
DSA-922 (DEBIAN)
SUSE-SA:2005:029 (SUSE)
13904 (BID)
USN-143-1 (UBUNTU)
CVE: CVE-2005-1767
CVE: CVE-2005-1767
Id:
CVE-2005-1767
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1767
Comment
: traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
SUSE-SA:2005:044 (SUSE)
USN-187-1 (UBUNTU)
DSA-922 (DEBIAN)
14467 (BID)
DSA-921 (DEBIAN)
18056 (SECUNIA)
18059 (SECUNIA)
MDKSA-2006:044 (MANDRIVA)
18977 (SECUNIA)
RHSA-2005:663 (REDHAT)
17002 (SECUNIA)
ADV-2005-1878 (VUPEN)
oval:org.mitre.oval:def:11101 (OVAL)
http://kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=51e31546a2fc46cb978da2ee0330a6a68f07541e (MISC)
CVE: CVE-2005-2456
CVE: CVE-2005-2456
Id:
CVE-2005-2456
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456
Comment
: Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p->dir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock->sk_policy array.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
667 (Improper Locking)
References:
14477 (BID)
16298 (SECUNIA)
16500 (SECUNIA)
SUSE-SA:2005:050 (SUSE)
DSA-922 (DEBIAN)
DSA-921 (DEBIAN)
18056 (SECUNIA)
18059 (SECUNIA)
RHSA-2005:514 (REDHAT)
RHSA-2005:663 (REDHAT)
17073 (SECUNIA)
17826 (SECUNIA)
17002 (SECUNIA)
ADV-2005-1878 (VUPEN)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
linux-kernel-xfrm-dos(21710) (XF)
oval:org.mitre.oval:def:10858 (OVAL)
USN-169-1 (UBUNTU)
FLSA:157459-3 (FEDORA)
http://www.mail-archive.com/netdev%40vger.kernel.org/msg00520.html ()
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=8da3e25b2c4c1f305fd85428d3a9eb62b543bfba%3Bhp=ecade4893a139cc35d4fe345ce70242ede5358c4%3Bhb=a4f1bac62564049ea4718c4624b0fadc9f597c84%3Bf=net/xfrm/xfrm_user.c ()
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a4f1bac62564049ea4718c4624b0fadc9f597c84 ()
CVE: CVE-2005-2458
CVE: CVE-2005-2458
Id:
CVE-2005-2458
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458
Comment
: inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with "improper tables".
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 (CONFIRM)
16355 (SECUNIA)
16500 (SECUNIA)
17826 (SECUNIA)
17918 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
18510 (SECUNIA)
18684 (SECUNIA)
19252 (SECUNIA)
[bug-gnu-utils] 19990625 Re: bug in gzip: segfault when doing "gzip -t" on a broken file (MLIST)
DSA-921 (DEBIAN)
DSA-922 (DEBIAN)
MDKSA-2005:219 (MANDRAKE)
MDKSA-2005:220 (MANDRAKE)
SUSE-SA:2005:050 (SUSE)
RHSA-2006:0101 (REDHAT)
RHSA-2006:0144 (REDHAT)
RHSA-2006:0190 (REDHAT)
RHSA-2006:0191 (REDHAT)
SUSE-SA:2005:068 (SUSE)
FLSA:157459-3 (FEDORA)
FLSA:157459-1 (FEDORA)
FLSA:157459-2 (FEDORA)
14719 (BID)
oval:org.mitre.oval:def:10785 (OVAL)
USN-169-1 (UBUNTU)
CVE: CVE-2005-2459
CVE: CVE-2005-2459
Id:
CVE-2005-2459
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459
Comment
: The huft_build function in inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 returns the wrong value, which allows remote attackers to cause a denial of service (kernel crash) via a certain compressed file that leads to a null pointer dereference, a different vulnerability than CVE-2005-2458.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
476 (NULL Pointer Dereference)
References:
http://bugs.gentoo.org/show_bug.cgi?id=94584 (MISC)
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.12.5 (CONFIRM)
16355 (SECUNIA)
16500 (SECUNIA)
17826 (SECUNIA)
17918 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
DSA-921 (DEBIAN)
DSA-922 (DEBIAN)
MDKSA-2005:219 (MANDRAKE)
MDKSA-2005:220 (MANDRAKE)
SUSE-SA:2005:050 (SUSE)
SUSE-SA:2005:068 (SUSE)
14720 (BID)
USN-169-1 (UBUNTU)
CVE: CVE-2005-2548
CVE: CVE-2005-2548
Id:
CVE-2005-2548
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548
Comment
: vlan_dev.c in the VLAN code for Linux kernel 2.6.8 allows remote attackers to cause a denial of service (kernel oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument, as demonstrated using snmpwalk on snmpd.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=309308 (CONFIRM)
http://lists.osdl.org/pipermail/bridge/2004-September/000638.html (CONFIRM)
17826 (SECUNIA)
18056 (SECUNIA)
DSA-922 (DEBIAN)
MDKSA-2005:219 (MANDRAKE)
14611 (BID)
USN-169-1 (UBUNTU)
CVE: CVE-2005-2801
CVE: CVE-2005-2801
Id:
CVE-2005-2801
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2801
Comment
: xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
HIGH
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CWE:
697 (Insufficient Comparison)
References:
[Acl-Devel] 20050205 [FIX] Long-standing xattr sharing bug (MLIST)
[debian-kernel] 20050809 Re: ACL patches in Debian 2.4 series kernel. (MLIST)
SUSE-SA:2005:018 (SUSE)
DSA-922 (DEBIAN)
DSA-921 (DEBIAN)
14793 (BID)
18056 (SECUNIA)
18059 (SECUNIA)
RHSA-2006:0144 (REDHAT)
RHSA-2005:514 (REDHAT)
19252 (SECUNIA)
17073 (SECUNIA)
17826 (SECUNIA)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:10495 (OVAL)
FLSA:157459-3 (FEDORA)
CVE: CVE-2005-2872
CVE: CVE-2005-2872
Id:
CVE-2005-2872
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872
Comment
: The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=322237 (CONFIRM)
DSA-922 (DEBIAN)
DSA-921 (DEBIAN)
14791 (BID)
17918 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
RHSA-2005:514 (REDHAT)
17073 (SECUNIA)
17826 (SECUNIA)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:11394 (OVAL)
FLSA:157459-3 (FEDORA)
SUSE-SA:2005:068 (SUSE)
http://www.kernel.org/git/?p=linux/kernel/git/chrisw/lsm-2.6.git%3Ba=commit%3Bh=bcfff0b471a60df350338bcd727fc9b8a6aa54b2 ()
CVE: CVE-2005-3105
CVE: CVE-2005-3105
Id:
CVE-2005-3105
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3105
Comment
: The mprotect code (mprotect.c) in Linux 2.6 on Itanium IA64 Montecito processors does not properly maintain cache coherency as required by the architecture, which allows local users to cause a denial of service and possibly corrupt data by modifying PTE protections.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
http://www.intel.com/cd/ids/developer/asmo-na/eng/215766.htm (MISC)
http://cache-www.intel.com/cd/00/00/21/57/215792_215792.pdf (MISC)
DSA-922 (DEBIAN)
18056 (SECUNIA)
RHSA-2005:514 (REDHAT)
oval:org.mitre.oval:def:11283 (OVAL)
http://linux.bkbits.net:8080/linux-2.6/cset%404248d4019z8HvgrPAji51TKrWiV2uw?nav=index.html%7Csrc/%7Csrc/mm%7Crelated/mm/mprotect.c ()
CVE: CVE-2005-3106
CVE: CVE-2005-3106
Id:
CVE-2005-3106
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3106
Comment
: Race condition in Linux 2.6, when threads are sharing memory mapping via CLONE_VM (such as linuxthreads and vfork), might allow local users to cause a denial of service (deadlock) by triggering a core dump while waiting for a thread that has just performed an exec.
CVSSv2 Score:
1.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:P
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
667 (Improper Locking)
References:
USN-199-1 (UBUNTU)
DSA-922 (DEBIAN)
18056 (SECUNIA)
15049 (BID)
RHSA-2006:0101 (REDHAT)
18510 (SECUNIA)
17141 (SECUNIA)
MDKSA-2006:072 (MANDRIVA)
oval:org.mitre.oval:def:9108 (OVAL)
FLSA:157459-3 (FEDORA)
http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.156?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c ()
CVE: CVE-2005-3107
CVE: CVE-2005-3107
Id:
CVE-2005-3107
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3107
Comment
: fs/exec.c in Linux 2.6, when one thread is tracing another thread that shares the same memory map, might allow local users to cause a denial of service (deadlock) by forcing a core dump when the traced thread is in the TASK_TRACED state.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
http://www.kernel.org/pub/linux/kernel/people/akpm/patches/2.6/2.6.11-rc1/2.6.11-rc1-mm1/broken-out/fix-coredump_wait-deadlock-with-ptracer-tracee-on-shared-mm.patch (CONFIRM)
USN-199-1 (UBUNTU)
DSA-922 (DEBIAN)
18056 (SECUNIA)
15049 (BID)
17141 (SECUNIA)
RHSA-2005:420 (REDHAT)
RHSA-2006:0437 (REDHAT)
21136 (SECUNIA)
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm (CONFIRM)
21983 (SECUNIA)
MDKSA-2006:072 (MANDRIVA)
oval:org.mitre.oval:def:11473 (OVAL)
http://linux.bkbits.net:8080/linux-2.6/diffs/fs/exec.c%401.155?nav=index.html%7Csrc/%7Csrc/fs%7Chist/fs/exec.c ()
CVE: CVE-2005-3108
CVE: CVE-2005-3108
Id:
CVE-2005-3108
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3108
Comment
: mm/ioremap.c in Linux 2.6 on 64-bit x86 systems allows local users to cause a denial of service or an information leak via an ioremap on a certain memory map that causes the iounmap to perform a lookup of a page that does not exist.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
USN-199-1 (UBUNTU)
RHSA-2005:808 (REDHAT)
17364 (SECUNIA)
DSA-922 (DEBIAN)
18056 (SECUNIA)
15049 (BID)
17141 (SECUNIA)
oval:org.mitre.oval:def:11322 (OVAL)
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=93ef70a217637ade3f335303a112b22a134a1ec2 ()
CVE: CVE-2005-3109
CVE: CVE-2005-3109
Id:
CVE-2005-3109
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3109
Comment
: The HFS and HFS+ (hfsplus) modules in Linux 2.6 allow attackers to cause a denial of service (oops) by using hfsplus to mount a filesystem that is not hfsplus.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
399 (Resource Management Errors)
References:
USN-199-1 (UBUNTU)
DSA-922 (DEBIAN)
18056 (SECUNIA)
15049 (BID)
RHSA-2006:0101 (REDHAT)
18510 (SECUNIA)
17141 (SECUNIA)
oval:org.mitre.oval:def:10777 (OVAL)
FLSA:157459-3 (FEDORA)
http://www.kernel.org/git/gitweb.cgi?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=945b092011c6af71a0107be96e119c8c08776f3f ()
CVE: CVE-2005-3110
CVE: CVE-2005-3110
Id:
CVE-2005-3110
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3110
Comment
: Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
CVSSv2 Score:
2.6
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
17141 (SECUNIA)
17364 (SECUNIA)
17918 (SECUNIA)
18056 (SECUNIA)
http://sourceforge.net/mailarchive/forum.php?thread_id=6800453&forum_id=8572 (CONFIRM)
DSA-922 (DEBIAN)
MDKSA-2006:072 (MANDRIVA)
RHSA-2005:808 (REDHAT)
SUSE-SA:2005:068 (SUSE)
FLSA:157459-3 (FEDORA)
15049 (BID)
USN-199-1 (UBUNTU)
oval:org.mitre.oval:def:11403 (OVAL)
CVE: CVE-2005-3271
CVE: CVE-2005-3271
Id:
CVE-2005-3271
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271
Comment
: Exec in Linux kernel 2.6 does not properly clear posix-timers in multi-threaded environments, which results in a resource leak and could allow a large number of multiple local users to cause a denial of service by using more posix-timers than specified by the quota for a single user.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
[linux-kernel] 20040911 [PATCH] exec: fix posix-timers leak and pending signal loss (MLIST)
15533 (BID)
SUSE-SA:2005:067 (SUSE)
17917 (SECUNIA)
DSA-922 (DEBIAN)
18056 (SECUNIA)
17826 (SECUNIA)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
USN-219-1 (UBUNTU)
http://linux.bkbits.net:8080/linux-2.6/cset%40414b332fsZQvEUsfzKJIo-q2_ZH0hg ()
CVE: CVE-2005-3272
CVE: CVE-2005-3272
Id:
CVE-2005-3272
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3272
Comment
: Linux kernel before 2.6.12 allows remote attackers to poison the bridge forwarding table using frames that have already been dropped by filtering, which can cause the bridge to forward spoofed packets.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE:
CWE-Other ()
References:
DSA-922 (DEBIAN)
15536 (BID)
18056 (SECUNIA)
RHSA-2006:0493 (REDHAT)
20237 (SECUNIA)
http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm (CONFIRM)
21745 (SECUNIA)
MDKSA-2007:025 (MANDRIVA)
oval:org.mitre.oval:def:10157 (OVAL)
USN-219-1 (UBUNTU)
http://linux.bkbits.net:8080/linux-2.6/cset%40429a310bRFOXOmZvKaGXW8A5Qd9F1A ()
CVE: CVE-2005-3273
CVE: CVE-2005-3273
Id:
CVE-2005-3273
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273
Comment
: The rose_rt_ioctl function in rose_route.c for Radionet Open Source Environment (ROSE) in Linux 2.6 kernels before 2.6.12, and 2.4 before 2.4.29, does not properly verify the ndigis argument for a new route, which allows attackers to trigger array out-of-bounds errors with a large number of digipeats.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
http://lkml.org/lkml/2005/5/23/169 (CONFIRM)
1014115 (SECTRACK)
DSA-922 (DEBIAN)
13886 (BID)
18056 (SECUNIA)
17826 (SECUNIA)
RHSA-2005:663 (REDHAT)
RHSA-2006:0579 (REDHAT)
RHSA-2006:0580 (REDHAT)
21035 (SECUNIA)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:9552 (OVAL)
USN-219-1 (UBUNTU)
FLSA:157459-1 (FEDORA)
http://linux.bkbits.net:8080/linux-2.6/cset%40423114bcdthRtmtdS6MsZiBVvteGCg ()
http://linux.bkbits.net:8080/linux-2.4/cset%4041e2cf515TpixcVQ8q8HvQvCv9E6zA ()
CVE: CVE-2005-3274
CVE: CVE-2005-3274
Id:
CVE-2005-3274
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274
Comment
: Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
CVSSv2 Score:
1.2
Access vector:
LOCAL
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:H/Au:N/C:N/I:N/A:P
CVSSv3 Score:
4.7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
http://lkml.org/lkml/2005/6/23/249 (CONFIRM)
http://lkml.org/lkml/2005/6/24/173 (CONFIRM)
15528 (BID)
DSA-922 (DEBIAN)
18056 (SECUNIA)
RHSA-2006:0190 (REDHAT)
18684 (SECUNIA)
MDKSA-2006:044 (MANDRIVA)
18977 (SECUNIA)
17826 (SECUNIA)
RHSA-2005:663 (REDHAT)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:235 (MANDRIVA)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:11723 (OVAL)
USN-219-1 (UBUNTU)
FLSA:157459-4 (FEDORA)
FLSA:157459-3 (FEDORA)
http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d ()
CVE: CVE-2005-3275
CVE: CVE-2005-3275
Id:
CVE-2005-3275
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275
Comment
: The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.
CVSSv2 Score:
2.6
Access vector:
NETWORK
Access complexity:
HIGH
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:H/Au:N/C:N/I:N/A:P
CWE:
CWE-Other ()
References:
DSA-922 (DEBIAN)
15531 (BID)
DSA-921 (DEBIAN)
17918 (SECUNIA)
18056 (SECUNIA)
18059 (SECUNIA)
RHSA-2006:0140 (REDHAT)
18562 (SECUNIA)
RHSA-2006:0190 (REDHAT)
RHSA-2006:0191 (REDHAT)
18684 (SECUNIA)
MDKSA-2006:044 (MANDRIVA)
18977 (SECUNIA)
17826 (SECUNIA)
19185 (SECUNIA)
20060402-01-U (SGI)
19607 (SECUNIA)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:10142 (OVAL)
USN-219-1 (UBUNTU)
FLSA:157459-2 (FEDORA)
FLSA:157459-1 (FEDORA)
FLSA:157459-3 (FEDORA)
SUSE-SA:2005:068 (SUSE)
http://linux.bkbits.net:8080/linux-2.6/cset%4042e14e05d0V1d88nZlaIX1F9dCRApA ()
CVE: CVE-2005-3276
CVE: CVE-2005-3276
Id:
CVE-2005-3276
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276
Comment
: The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
CWE-Other ()
References:
http://lkml.org/lkml/2005/8/3/36 (CONFIRM)
15527 (BID)
DSA-922 (DEBIAN)
18056 (SECUNIA)
RHSA-2006:0101 (REDHAT)
18510 (SECUNIA)
RHSA-2006:0144 (REDHAT)
19252 (SECUNIA)
17826 (SECUNIA)
MDKSA-2005:218 (MANDRAKE)
MDKSA-2005:220 (MANDRAKE)
MDKSA-2005:219 (MANDRAKE)
oval:org.mitre.oval:def:9748 (OVAL)
USN-219-1 (UBUNTU)
FLSA:157459-2 (FEDORA)
FLSA:157459-1 (FEDORA)
FLSA:157459-3 (FEDORA)
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=71ae18ec690953e9ba7107c7cc44589c2cc0d9f1 ()
http://linux.bkbits.net:8080/linux-2.6/cset%4042e81864gSEM90Oun0jA8dufpM3inw ()
Content available only for registered users!
ovaldb@altx-soft.com