Lucene search

K
cveMitreCVE-2005-0001
HistoryMay 02, 2005 - 4:00 a.m.

CVE-2005-0001

2005-05-0204:00:00
mitre
web.nvd.nist.gov
51
cve-2005-0001
linux kernel
page fault handler
multiprocessor
arbitrary code execution

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

28.5%

Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.

Affected configurations

Nvd
Node
linuxlinux_kernelMatch2.2.7
OR
linuxlinux_kernelMatch2.4.0
OR
linuxlinux_kernelMatch2.4.1
OR
linuxlinux_kernelMatch2.4.2
OR
linuxlinux_kernelMatch2.4.3
OR
linuxlinux_kernelMatch2.4.4
OR
linuxlinux_kernelMatch2.4.5
OR
linuxlinux_kernelMatch2.4.6
OR
linuxlinux_kernelMatch2.4.7
OR
linuxlinux_kernelMatch2.4.8
OR
linuxlinux_kernelMatch2.4.9
OR
linuxlinux_kernelMatch2.4.10
OR
linuxlinux_kernelMatch2.4.11
OR
linuxlinux_kernelMatch2.4.12
OR
linuxlinux_kernelMatch2.4.13
OR
linuxlinux_kernelMatch2.4.14
OR
linuxlinux_kernelMatch2.4.15
OR
linuxlinux_kernelMatch2.4.16
OR
linuxlinux_kernelMatch2.4.17
OR
linuxlinux_kernelMatch2.4.18
OR
linuxlinux_kernelMatch2.4.19
OR
linuxlinux_kernelMatch2.4.20
OR
linuxlinux_kernelMatch2.4.21
OR
linuxlinux_kernelMatch2.4.22
OR
linuxlinux_kernelMatch2.4.23
OR
linuxlinux_kernelMatch2.4.24
OR
linuxlinux_kernelMatch2.4.25
OR
linuxlinux_kernelMatch2.4.26
OR
linuxlinux_kernelMatch2.4.27
OR
linuxlinux_kernelMatch2.4.28
OR
linuxlinux_kernelMatch2.4.29
OR
linuxlinux_kernelMatch2.6.0
OR
linuxlinux_kernelMatch2.6.1
OR
linuxlinux_kernelMatch2.6.2
OR
linuxlinux_kernelMatch2.6.3
OR
linuxlinux_kernelMatch2.6.4
OR
linuxlinux_kernelMatch2.6.5
OR
linuxlinux_kernelMatch2.6.6
OR
linuxlinux_kernelMatch2.6.7
OR
linuxlinux_kernelMatch2.6.8
OR
linuxlinux_kernelMatch2.6.92.6.20
OR
linuxlinux_kernelMatch2.6.10
OR
redhatenterprise_linuxMatch3.0advanced_server
OR
redhatenterprise_linuxMatch3.0enterprise_server
OR
redhatenterprise_linuxMatch3.0workstation_server
OR
redhatenterprise_linuxMatch4.0advanced_server
OR
redhatenterprise_linuxMatch4.0enterprise_server
OR
redhatenterprise_linuxMatch4.0workstation
OR
redhatenterprise_linux_desktopMatch3.0
OR
redhatenterprise_linux_desktopMatch4.0
OR
trustixsecure_linuxMatch2
OR
trustixsecure_linuxMatch2.1
OR
trustixsecure_linuxMatch2.2
VendorProductVersionCPE
linuxlinux_kernel2.2.7cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*
linuxlinux_kernel2.4.0cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
linuxlinux_kernel2.4.1cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
linuxlinux_kernel2.4.2cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
linuxlinux_kernel2.4.3cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
linuxlinux_kernel2.4.4cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
linuxlinux_kernel2.4.5cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
linuxlinux_kernel2.4.6cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
linuxlinux_kernel2.4.7cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
linuxlinux_kernel2.4.8cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 531

References

CVSS2

6.9

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

28.5%