Lucene search

K
ubuntuUbuntuUSN-60-0
HistoryJan 14, 2005 - 12:00 a.m.

Linux kernel vulnerabilities

2005-01-1400:00:00
ubuntu.com
31

6.4 Medium

AI Score

Confidence

Low

0.106 Low

EPSS

Percentile

95.0%

Releases

  • Ubuntu 4.10

Details

CAN-2005-0001:

Paul Starzetz discovered a race condition in the Linux page fault
handler code. This allowed an unprivileged user to gain root
privileges on multiprocessor machines under some circumstances.
This also affects the Hyper-Threading mode on Pentium 4 processors.

<http://lists.netsys.com/pipermail/full-disclosure/2005-January/030660.html&gt;:

Brad Spengler discovered that some device drivers used
copy_from_user() (a function to copy data from userspace tools into
kernel memory) with insufficient input validation. This potentially
allowed users and/or malicious hardware to overwrite kernel memory
which could result in a crash (Denial of Service) or even root
privilege escalation.

Additionally, this update corrects the SMB file system driver.
USN-30-1 fixed some vulnerabilities in this driver (see CAN-2004-0883,
CAN-2004-0949). However, it was found that these new validation checks
were too strict, which cause some valid operations to fail.

6.4 Medium

AI Score

Confidence

Low

0.106 Low

EPSS

Percentile

95.0%