First published: Wed Mar 09 2005(Updated: )
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Conectiva Linux | =10.0 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.11 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
Red Hat Enterprise Linux | =4.0 | |
redhat enterprise Linux desktop | =4.0 | |
Red Hat Fedora Core | =core_2.0 | |
Red Hat Fedora Core | =core_3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0736 is rated as a high severity vulnerability due to its potential to allow local users to overwrite kernel memory.
To fix CVE-2005-0736, you should upgrade your Linux kernel to a version that addresses this integer overflow vulnerability.
CVE-2005-0736 affects Linux kernel versions from 2.6.0 to 2.6.11 inclusive.
CVE-2005-0736 impacts various systems running affected versions of the Linux kernel including Conectiva Linux and Red Hat Enterprise Linux.
CVE-2005-0736 is primarily a local vulnerability, meaning it requires local access to the system to be exploited.