CVE-2005-0001
Summary
| CVE | CVE-2005-0001 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2005-05-02 04:00:00 UTC |
| Updated | 2025-04-03 01:03:51 UTC |
| Description | Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion. |
Risk And Classification
Primary CVSS: v2.0 6.9 from [email protected]
AV:L/AC:M/Au:N/C:C/I:C/A:C
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
LocalAccess Complexity
MediumAuthentication
NoneConfidentiality
CompleteIntegrity
CompleteAvailability
CompleteAV:L/AC:M/Au:N/C:C/I:C/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Linux | Linux Kernel | 2.2.7 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.0 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.1 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.10 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.11 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.12 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.13 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.14 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.15 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.16 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.17 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.18 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.19 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.2 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.20 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.21 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.22 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.23 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.24 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.25 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.26 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.27 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.28 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.29 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.3 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.4 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.5 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.6 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.7 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.8 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.4.9 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.0 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.1 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.10 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.2 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.3 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.4 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.5 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.6 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.7 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.8 | All | All | All |
| Operating System | Linux | Linux Kernel | 2.6.9 | 2.6.20 | All | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 3.0 | All | workstation_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | advanced_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | enterprise_server | All |
| Operating System | Redhat | Enterprise Linux | 4.0 | All | workstation | All |
| Operating System | Redhat | Enterprise Linux Desktop | 3.0 | All | All | All |
| Operating System | Redhat | Enterprise Linux Desktop | 4.0 | All | All | All |
| Operating System | Trustix | Secure Linux | 2 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.1 | All | All | All |
| Operating System | Trustix | Secure Linux | 2.2 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Secunia - Advisories - Debian update for kernel-source-2.4.18 | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Debian -- Security Information -- DSA-1067-1 kernel-source-2.4.16 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| '[USN-60-0] Linux kernel vulnerabilities' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| Home - Conectiva | af854a3a-2127-422b-91ae-364da2661108 | distro.conectiva.com.br | |
| www.trustix.org/errata/2005/0001 | af854a3a-2127-422b-91ae-364da2661108 | www.trustix.org | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Secunia - Advisories - Linux Kernel Page Fault Handler Privilege Escalation | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| Debian -- Security Information -- DSA-1082-1 kernel-source-2.4.17 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| SecurityTracker.com Archives - Linux Kernel Multiprocessor Page Fault Handler Race Condition Lets Local Users Gain Elevated Privileges | af854a3a-2127-422b-91ae-364da2661108 | securitytracker.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| rhn.redhat.com | Red Hat Support | af854a3a-2127-422b-91ae-364da2661108 | www.redhat.com | |
| [Full-Disclosure] Linux kernel i386 SMP page fault handler privilege escalation | af854a3a-2127-422b-91ae-364da2661108 | lists.grok.org.uk | |
| 'Linux kernel i386 SMP page fault handler privilege escalation' - MARC | af854a3a-2127-422b-91ae-364da2661108 | marc.info | |
| bugzilla.fedora.us/show_bug.cgi | af854a3a-2127-422b-91ae-364da2661108 | bugzilla.fedora.us | |
| Secunia - Advisories - Debian update for kernel-source-2.4.19 | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Secunia - Advisories - Debian update for kernel-source-2.4.17 | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| Repository / Oval Repository | af854a3a-2127-422b-91ae-364da2661108 | oval.cisecurity.org | |
| Advisories - Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Linux Kernel Symmetrical Multiprocessing Page Fault Local Privilege Escalation Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Debian -- Security Information -- DSA-1070-1 kernel-source-2.4.19 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| isec.pl/vulnerabilities/isec-0022-pagefault.txt | af854a3a-2127-422b-91ae-364da2661108 | isec.pl | |
| Debian -- Security Information -- DSA-1069-1 kernel-source-2.4.18 | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.