First published: Mon May 02 2005(Updated: )
Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.2.7 | |
Linux Kernel | =2.4.0 | |
Linux Kernel | =2.4.1 | |
Linux Kernel | =2.4.2 | |
Linux Kernel | =2.4.3 | |
Linux Kernel | =2.4.4 | |
Linux Kernel | =2.4.5 | |
Linux Kernel | =2.4.6 | |
Linux Kernel | =2.4.7 | |
Linux Kernel | =2.4.8 | |
Linux Kernel | =2.4.9 | |
Linux Kernel | =2.4.10 | |
Linux Kernel | =2.4.11 | |
Linux Kernel | =2.4.12 | |
Linux Kernel | =2.4.13 | |
Linux Kernel | =2.4.14 | |
Linux Kernel | =2.4.15 | |
Linux Kernel | =2.4.16 | |
Linux Kernel | =2.4.17 | |
Linux Kernel | =2.4.18 | |
Linux Kernel | =2.4.19 | |
Linux Kernel | =2.4.20 | |
Linux Kernel | =2.4.21 | |
Linux Kernel | =2.4.22 | |
Linux Kernel | =2.4.23 | |
Linux Kernel | =2.4.24 | |
Linux Kernel | =2.4.25 | |
Linux Kernel | =2.4.26 | |
Linux Kernel | =2.4.27 | |
Linux Kernel | =2.4.28 | |
Linux Kernel | =2.4.29 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =3.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
redhat enterprise Linux desktop | =3.0 | |
redhat enterprise Linux desktop | =4.0 | |
Trustix Secure Linux | =2 | |
Trustix Secure Linux | =2.1 | |
Trustix Secure Linux | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0001 has a high severity rating, as it allows local users to execute arbitrary code due to a race condition.
To fix CVE-2005-0001, update your Linux kernel to a version above 2.6.10 or apply relevant patches provided by your distribution.
CVE-2005-0001 affects Linux kernel versions 2.2.x up to 2.2.7, and 2.4 and 2.6 versions up to 2.6.10, especially on multiprocessor machines.
CVE-2005-0001 can be exploited by local users with access to the vulnerable Linux system.
The potential impact of CVE-2005-0001 includes unauthorized execution of arbitrary code, leading to privilege escalation on vulnerable systems.