SB2005121401 - Improper input validation in Linux kernel
Published: December 14, 2005 Updated: November 6, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2005-3358)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
Linux kernel before 2.6.15 allows local users to cause a denial of service (panic) via a set_mempolicy call with a 0 bitmask, which causes a panic when a page fault occurs.
Remediation
Install update from vendor's website.
References
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=175683
- http://www.securityfocus.com/bid/16135
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15
- http://securitytracker.com/id?1015433
- http://secunia.com/advisories/18216
- http://www.redhat.com/support/errata/RHSA-2006-0101.html
- http://secunia.com/advisories/18510
- http://www.novell.com/linux/security/advisories/2006_06_kernel.html
- http://secunia.com/advisories/18788
- http://lists.suse.de/archive/suse-security-announce/2006-Feb/0010.html
- http://secunia.com/advisories/19038
- http://www.debian.org/security/2006/dsa-1017
- http://secunia.com/advisories/19374
- http://www.vupen.com/english/advisories/2006/0035
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10410
- http://www.securityfocus.com/archive/1/427981/100/0/threaded
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://linux.bkbits.net:8080/linux-2.6/cset%4042307e9fp8ihEMrfaoPMp_agDevQNA