← Voltar para CVEs
CVE-2005-1768
N/ADescricao
Race condition in the ia32 compatibility code for the execve system call in Linux kernel 2.4 before 2.4.31 and 2.6 before 2.6.6 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code via a concurrent thread that increments a pointer count after the nargs function has counted the pointers, but before the count is copied from user space to kernel space, which leads to a buffer overflow.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado7/11/2005
Ultima modificacao4/16/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
linux:linux_kernel
Referencias
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U(secalert@redhat.com)
http://marc.info/?l=bugtraq&m=112110120216116&w=2(secalert@redhat.com)
http://secunia.com/advisories/15980(secalert@redhat.com)
http://secunia.com/advisories/17002(secalert@redhat.com)
http://secunia.com/advisories/18059(secalert@redhat.com)
http://secunia.com/advisories/19185(secalert@redhat.com)
http://secunia.com/advisories/19607(secalert@redhat.com)
http://securitytracker.com/id?1014442(secalert@redhat.com)
http://www.debian.org/security/2005/dsa-921(secalert@redhat.com)
http://www.novell.com/linux/security/advisories/2005_44_kernel.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-551.html(secalert@redhat.com)
http://www.redhat.com/support/errata/RHSA-2005-663.html(secalert@redhat.com)
http://www.securityfocus.com/bid/14205(secalert@redhat.com)
http://www.suresec.org/advisories/adv4.pdf(secalert@redhat.com)
http://www.vupen.com/english/advisories/2005/1878(secalert@redhat.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11117(secalert@redhat.com)
ftp://patches.sgi.com/support/free/security/advisories/20060402-01-U(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=112110120216116&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/15980(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/17002(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18059(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19185(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19607(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1014442(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2005/dsa-921(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2005_44_kernel.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-551.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2005-663.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/14205(af854a3a-2127-422b-91ae-364da2661108)
http://www.suresec.org/advisories/adv4.pdf(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2005/1878(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11117(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.