CVE-2005-3055

Linux kernel 2.6.8 to 2.6.14-rc2 allows local users to cause a denial of service (kernel OOPS) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference.
References
Link Resource
http://www.securityfocus.com/advisories/9806 Third Party Advisory VDB Entry
http://secunia.com/advisories/17917 Permissions Required Third Party Advisory
http://www.securityfocus.com/bid/14955 Third Party Advisory VDB Entry
http://secunia.com/advisories/17918 Permissions Required Third Party Advisory
http://www.debian.org/security/2006/dsa-1017 Third Party Advisory
http://secunia.com/advisories/17826 Permissions Required Third Party Advisory
http://secunia.com/advisories/19374 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0579.html Not Applicable
http://www.redhat.com/support/errata/RHSA-2006-0580.html Not Applicable
http://secunia.com/advisories/21035 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0437.html Not Applicable
http://secunia.com/advisories/21136 Permissions Required Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0575.html Not Applicable
http://secunia.com/advisories/21465 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://secunia.com/advisories/21983 Permissions Required Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm Third Party Advisory
http://secunia.com/advisories/22417 Permissions Required Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Broken Link
http://www.vupen.com/english/advisories/2005/1863 Broken Link
http://marc.info/?l=linux-kernel&m=112766129313883 Mailing List
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9472
https://usn.ubuntu.com/219-1/
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*

Information

Published : 2005-09-26 12:03

Updated : 2018-10-19 08:34


NVD link : CVE-2005-3055

Mitre link : CVE-2005-3055


JSON object : View

CWE
CWE-20

Improper Input Validation

Advertisement

dedicated server usa

Products Affected

debian

  • debian_linux

linux

  • linux_kernel