CWE
399
Advisory Published
Updated

CVE-2005-3784

First published: Wed Nov 23 2005(Updated: )

The auto-reap of child processes in Linux kernel 2.6 before 2.6.15 includes processes with ptrace attached, which leads to a dangling ptrace reference and allows local users to cause a denial of service (crash) and gain root privileges.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Linux kernel=2.6.11
Linux kernel=2.6.11.2
Linux kernel=2.6.11.10
Linux kernel=2.6.1
Linux kernel=2.6.14.7
Linux kernel=2.6.13
Linux kernel=2.6.13.3
Linux kernel=2.6.11.8
Linux kernel=2.6.14.4
Linux kernel=2.6.14
Linux kernel=2.6.10
Linux kernel=2.6.14.3
Linux kernel=2.6.11.6
Linux kernel=2.6.11.11
Linux kernel=2.6.11.5
Linux kernel=2.6.14.5
Linux kernel=2.6.13.2
Linux kernel=2.6.13.5
Linux kernel=2.6.14.1
Linux kernel=2.6.12.5
Linux kernel=2.6.14.6
Linux kernel=2.6.12.1
Linux kernel=2.6.11.9
Linux kernel=2.6.0
Linux kernel=2.6.13.4
Linux kernel=2.6.12.2
Linux kernel=2.6.12.4
Linux kernel=2.6.11.3
Linux kernel=2.6.12.3
Linux kernel=2.6.12.6
Linux kernel=2.6.11.7
Linux kernel=2.6.14.2
Linux kernel=2.6.11.4
Linux kernel=2.6.11.12
Linux kernel=2.6.11.1
Linux kernel=2.6.13.1
Linux kernel=2.6.12
Linux Kernel=2.6.0
Linux Kernel=2.6.1
Linux Kernel=2.6.10
Linux Kernel=2.6.11
Linux Kernel=2.6.11.1
Linux Kernel=2.6.11.2
Linux Kernel=2.6.11.3
Linux Kernel=2.6.11.4
Linux Kernel=2.6.11.5
Linux Kernel=2.6.11.6
Linux Kernel=2.6.11.7
Linux Kernel=2.6.11.8
Linux Kernel=2.6.11.9
Linux Kernel=2.6.11.10
Linux Kernel=2.6.11.11
Linux Kernel=2.6.11.12
Linux Kernel=2.6.12
Linux Kernel=2.6.12.1
Linux Kernel=2.6.12.2
Linux Kernel=2.6.12.3
Linux Kernel=2.6.12.4
Linux Kernel=2.6.12.5
Linux Kernel=2.6.12.6
Linux Kernel=2.6.13
Linux Kernel=2.6.13.1
Linux Kernel=2.6.13.2
Linux Kernel=2.6.13.3
Linux Kernel=2.6.13.4
Linux Kernel=2.6.13.5
Linux Kernel=2.6.14
Linux Kernel=2.6.14.1
Linux Kernel=2.6.14.2
Linux Kernel=2.6.14.3
Linux Kernel=2.6.14.4
Linux Kernel=2.6.14.5
Linux Kernel=2.6.14.6
Linux Kernel=2.6.14.7

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2005-3784?

    CVE-2005-3784 is considered a high severity vulnerability due to its potential to allow local users to gain root privileges and cause a denial of service.

  • How do I fix CVE-2005-3784?

    To fix CVE-2005-3784, upgrade the Linux kernel to version 2.6.15 or later, which addresses this vulnerability.

  • Who is affected by CVE-2005-3784?

    CVE-2005-3784 affects multiple versions of the Linux kernel prior to version 2.6.15, including versions 2.6.0 through 2.6.14.7.

  • What are the consequences of exploiting CVE-2005-3784?

    Exploiting CVE-2005-3784 can lead to a local denial of service and unauthorized escalation of privileges to root.

  • Is CVE-2005-3784 still a concern today?

    While CVE-2005-3784 primarily affects outdated systems, it remains a concern for any system that has not been updated beyond kernel version 2.6.14.7.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203