First published: Fri Aug 05 2005(Updated: )
traps.c in the Linux kernel 2.6.x and 2.4.x executes stack segment faults on an exception stack, which allows local users to cause a denial of service (oops and stack fault exception).
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SUSE Open Enterprise Server | =9 | |
Novell Linux Desktop | =9 | |
SUSE Linux | =1.0 | |
SUSE Linux | =8 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.0 | |
SUSE Linux | =9.1 | |
SUSE Linux | =9.2 | |
SUSE Linux | =9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1767 has been classified as a denial of service vulnerability affecting specific versions of the Linux kernel.
To fix CVE-2005-1767, you should update your Linux kernel to a patched version provided by your distribution.
CVE-2005-1767 affects Linux kernel versions 2.4.x and 2.6.x.
CVE-2005-1767 requires local user access to exploit, and therefore is not a remote vulnerability.
The consequences of CVE-2005-1767 include denial of service, leading to system instability or crashes.