← Zuruck zu CVEs
CVE-2005-3358
N/ABeschreibung
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
CVE Details
CVSS v3.1 BewertungN/A
Veroffentlicht12/14/2005
Zuletzt geandert4/16/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
linux:linux_kernel
Referenzen
http://linux.bkbits.net:8080/linux-2.6/cset%4042307e9fp8ihEMrfaoPMp_agDevQNA(secalert@redhat.com)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html(secalert@redhat.com)
http://secunia.com/advisories/18216(secalert@redhat.com)
http://secunia.com/advisories/18510(secalert@redhat.com)
http://secunia.com/advisories/18788(secalert@redhat.com)
http://secunia.com/advisories/19038(secalert@redhat.com)
http://secunia.com/advisories/19374(secalert@redhat.com)
http://securitytracker.com/id?1015433(secalert@redhat.com)
http://www.debian.org/security/2006/dsa-1017(secalert@redhat.com)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2006_06_kernel.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2006-0101.html(secalert@redhat.com)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/archive/1/427981/100/0/threaded(secalert@redhat.com)
http://www.securityfocus.com/bid/16135(secalert@redhat.com)
http://www.vupen.com/english/advisories/2006/0035(secalert@redhat.com)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10410(secalert@redhat.com)
http://linux.bkbits.net:8080/linux-2.6/cset%4042307e9fp8ihEMrfaoPMp_agDevQNA(af854a3a-2127-422b-91ae-364da2661108)
http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18216(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18510(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18788(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19038(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19374(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015433(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2006/dsa-1017(af854a3a-2127-422b-91ae-364da2661108)
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2006_06_kernel.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2006-0101.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/427980/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/427981/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/16135(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/0035(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10410(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.