CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
28.5%
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.2.7 | cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.0 | cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.1 | cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.2 | cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.3 | cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.4 | cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.5 | cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.6 | cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.7 | cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:* |
linux | linux_kernel | 2.4.8 | cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:* |
distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930
isec.pl/vulnerabilities/isec-0022-pagefault.txt
lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html
marc.info/?l=bugtraq&m=110554694522719&w=2
marc.info/?l=bugtraq&m=110581146702951&w=2
secunia.com/advisories/13822
secunia.com/advisories/20163
secunia.com/advisories/20202
secunia.com/advisories/20338
securitytracker.com/id?1012862
www.debian.org/security/2006/dsa-1067
www.debian.org/security/2006/dsa-1069
www.debian.org/security/2006/dsa-1070
www.debian.org/security/2006/dsa-1082
www.mandriva.com/security/advisories?name=MDKSA-2005:022
www.redhat.com/support/errata/RHSA-2005-016.html
www.redhat.com/support/errata/RHSA-2005-017.html
www.redhat.com/support/errata/RHSA-2005-043.html
www.redhat.com/support/errata/RHSA-2005-092.html
www.securityfocus.com/bid/12244
www.trustix.org/errata/2005/0001/
bugzilla.fedora.us/show_bug.cgi?id=2336
exchange.xforce.ibmcloud.com/vulnerabilities/18849
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322