First published: Wed Sep 14 2005(Updated: )
The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubuntu | =4.10 | |
Ubuntu | =5.04 | |
Red Hat Enterprise Linux | =4.0 | |
Linux kernel | =2.6.11-rc3 | |
Linux kernel | =2.6.11 | |
Linux kernel | =2.6.12-rc1 | |
Linux kernel | =2.6.12-rc4 | |
Linux kernel | =2.6.5 | |
Linux kernel | =2.6.1 | |
Linux kernel | =2.6.11.8 | |
Linux kernel | =2.6.10 | |
Linux kernel | =2.6.11.6 | |
Linux kernel | =2.6.11.11 | |
Linux kernel | =2.6.0-test5 | |
Linux kernel | =2.6.3 | |
Linux kernel | =2.6.0-test2 | |
Linux kernel | =2.6.4 | |
Linux kernel | =2.6_test9_cvs | |
Linux kernel | =2.6.11.5 | |
Linux kernel | =2.6.7-rc1 | |
Linux kernel | =2.6.2 | |
Linux kernel | =2.6.8-rc1 | |
Linux kernel | =2.6.0-test11 | |
Linux kernel | =2.6.1-rc2 | |
Linux kernel | =2.6.11-rc4 | |
Linux kernel | =2.6.8 | |
Linux kernel | =2.6.0-test1 | |
Linux kernel | =2.6.0-test6 | |
Linux kernel | =2.6.10-rc2 | |
Linux kernel | =2.6.0-test4 | |
Linux kernel | =2.6.0 | |
Linux kernel | =2.6.0-test10 | |
Linux kernel | =2.6.0-test9 | |
Linux kernel | =2.6.7 | |
Linux kernel | =2.6.11-rc2 | |
Linux kernel | =2.6.1-rc1 | |
Linux kernel | =2.6.6-rc1 | |
Linux kernel | =2.6.9-2.6.20 | |
Linux kernel | =2.6.11.7 | |
Linux kernel | =2.6.0-test7 | |
Linux kernel | =2.6.8-rc2 | |
Linux kernel | =2.6.8-rc3 | |
Linux kernel | =2.6.0-test8 | |
Linux kernel | =2.6.6 | |
Linux kernel | =2.6.0-test3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2492 is classified as a moderate severity vulnerability due to its potential for denial of service and arbitrary memory read.
To fix CVE-2005-2492, users should upgrade their Linux kernel to version 2.6.13.1 or later, or apply the appropriate patches provided by their distribution.
CVE-2005-2492 affects local users on systems running Linux kernel versions prior to 2.6.13.1.
An attacker exploiting CVE-2005-2492 can cause a denial of service or potentially read from arbitrary memory.
Yes, CVE-2005-2492 is widely recognized and discussed in the cybersecurity community due to its impact on several Linux distributions.