First published: Fri Aug 05 2005(Updated: )
Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Open Enterprise Server | =9 | |
Novell Linux Desktop | =9 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.3 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.0 | |
SUSE Linux | =8 | |
SUSE Linux | =1.0 | |
SUSE Linux | =9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1761 has a medium severity level as it allows local users to crash the kernel, leading to a denial of service.
To fix CVE-2005-1761, update your kernel to the latest stable version that addresses this vulnerability.
CVE-2005-1761 affects several versions of the Linux kernel on IA64 architecture, primarily in Novell Open Enterprise Server and SUSE Linux.
No, CVE-2005-1761 requires local user access to exploit the vulnerability.
The main consequence of CVE-2005-1761 is a denial of service attack that results in kernel crashes, impacting system availability.