2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
"ID" : "CVE-2005-0001" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
"value" : "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
2018-04-05 09:33:01 -04:00
"name" : "20050112 Linux kernel i386 SMP page fault handler privilege escalation" ,
"refsource" : "BUGTRAQ" ,
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?l=bugtraq&m=110554694522719&w=2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20050112 Linux kernel i386 SMP page fault handler privilege escalation" ,
"refsource" : "FULLDISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://lists.grok.org.uk/pipermail/full-disclosure/2005-January/030826.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "http://isec.pl/vulnerabilities/isec-0022-pagefault.txt" ,
"refsource" : "MISC" ,
2017-10-16 12:31:07 -04:00
"url" : "http://isec.pl/vulnerabilities/isec-0022-pagefault.txt"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "CLA-2005:930" ,
"refsource" : "CONECTIVA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1070" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2006/dsa-1070"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1067" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2006/dsa-1067"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1069" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2006/dsa-1069"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "DSA-1082" ,
"refsource" : "DEBIAN" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.debian.org/security/2006/dsa-1082"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "FLSA:2336" ,
"refsource" : "FEDORA" ,
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.fedora.us/show_bug.cgi?id=2336"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "MDKSA-2005:022" ,
"refsource" : "MANDRAKE" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2005:022"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2005:043" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2005-043.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2005:092" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2005-092.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2005:016" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2005-016.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "RHSA-2005:017" ,
"refsource" : "REDHAT" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.redhat.com/support/errata/RHSA-2005-017.html"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "2005-0001" ,
"refsource" : "TRUSTIX" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.trustix.org/errata/2005/0001/"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20050114 [USN-60-0] Linux kernel vulnerabilities" ,
"refsource" : "BUGTRAQ" ,
2017-10-16 12:31:07 -04:00
"url" : "http://marc.info/?l=bugtraq&m=110581146702951&w=2"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "12244" ,
"refsource" : "BID" ,
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/12244"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "oval:org.mitre.oval:def:10322" ,
"refsource" : "OVAL" ,
2017-10-16 12:31:07 -04:00
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10322"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "1012862" ,
"refsource" : "SECTRACK" ,
2017-10-16 12:31:07 -04:00
"url" : "http://securitytracker.com/id?1012862"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "13822" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/13822"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20163" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/20163"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20202" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/20202"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "20338" ,
"refsource" : "SECUNIA" ,
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/20338"
} ,
{
2018-04-05 09:33:01 -04:00
"name" : "linux-fault-handler-gain-privileges(18849)" ,
"refsource" : "XF" ,
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/18849"
}
]
}
}