Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Version | Base score | Base severity | Vector |
---|
Hyperlink | Resource Type |
---|
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Type | CWE ID | Description |
---|---|---|
text | N/A | n/a |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.redhat.com/support/errata/RHSA-2005-366.html | vendor-advisory x_refsource_REDHAT |
http://www.securityfocus.com/bid/12763 | vdb-entry x_refsource_BID |
http://linux.bkbits.net:8080/linux-2.6/cset%40422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html%7CChangeSet%40-1d | x_refsource_CONFIRM |
http://www.novell.com/linux/security/advisories/2005_18_kernel.html | vendor-advisory x_refsource_SUSE |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html | mailing-list x_refsource_FULLDISC |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870 | vdb-entry signature x_refsource_OVAL |
http://www.redhat.com/support/errata/RHSA-2005-293.html | vendor-advisory x_refsource_REDHAT |
https://usn.ubuntu.com/95-1/ | vendor-advisory x_refsource_UBUNTU |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|---|
http://www.redhat.com/support/errata/RHSA-2005-366.html | vendor-advisory x_refsource_REDHAT x_transferred |
http://www.securityfocus.com/bid/12763 | vdb-entry x_refsource_BID x_transferred |
http://linux.bkbits.net:8080/linux-2.6/cset%40422dd06a1p5PsyFhoGAJseinjEq3ew?nav=index.html%7CChangeSet%40-1d | x_refsource_CONFIRM x_transferred |
http://www.novell.com/linux/security/advisories/2005_18_kernel.html | vendor-advisory x_refsource_SUSE x_transferred |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-March/032314.html | mailing-list x_refsource_FULLDISC x_transferred |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9870 | vdb-entry signature x_refsource_OVAL x_transferred |
http://www.redhat.com/support/errata/RHSA-2005-293.html | vendor-advisory x_refsource_REDHAT x_transferred |
https://usn.ubuntu.com/95-1/ | vendor-advisory x_refsource_UBUNTU x_transferred |
Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
Date Added | Due Date | Vulnerability Name | Required Action |
---|---|---|---|
N/A |
Type | Version | Base score | Base severity | Vector |
---|---|---|---|---|
Primary | 2.0 | 2.1 | LOW | AV:L/AC:L/Au:N/C:N/I:P/A:N |
CWE ID | Type | Source |
---|---|---|
NVD-CWE-Other | Primary | nvd@nist.gov |