First published: Tue May 17 2005(Updated: )
Raw character devices (raw.c) in the Linux kernel 2.6.x call the wrong function before passing an ioctl to the block device, which crosses security boundaries by making kernel address space accessible from user space, a similar vulnerability to CVE-2005-1589.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0-test1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.6.0-test3 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0-test5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.6.0-test7 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.6-rc1 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.7-rc1 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.8-rc1 | |
Linux Kernel | =2.6.8-rc2 | |
Linux Kernel | =2.6.8-rc3 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6_test9_cvs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1264 is classified as a high-severity vulnerability, as it allows kernel address space to be accessed from user space.
To fix CVE-2005-1264, you should upgrade to a patched version of the Linux kernel beyond 2.6.11.
CVE-2005-1264 affects versions of the Linux kernel from 2.6.0 up to 2.6.10.
CVE-2005-1264 can lead to unauthorized access to kernel memory, potentially allowing a user to execute arbitrary code.
Yes, CVE-2005-1264 is similar to CVE-2005-1589, as both involve improper handling of ioctls in the Linux kernel.