CVE-2005-0937 : Detail

CVE-2005-0937

0.06%V4
Local
2005-03-30
03h00 +00:00
2018-10-19
12h57 +00:00
Notifications for a CVE
Stay informed of any changes for a specific CVE.
Notifications manage

CVE Descriptions

Some futex functions in futex.c for Linux kernel 2.6.x perform get_user calls while holding the mmap_sem semaphore, which could allow local users to cause a deadlock condition in do_page_fault by triggering get_user faults while another thread is executing mmap or other functions.

CVE Informations

Metrics

Metrics Score Severity CVSS Vector Source
V2 1.2 AV:L/AC:H/Au:N/C:N/I:N/A:P nvd@nist.gov

EPSS

EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.

EPSS Score

The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.

EPSS Percentile

The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.

Products Mentioned

Configuraton 0

Linux>>Linux_kernel >> Version 2.5.0

Linux>>Linux_kernel >> Version 2.5.1

Linux>>Linux_kernel >> Version 2.5.2

Linux>>Linux_kernel >> Version 2.5.3

Linux>>Linux_kernel >> Version 2.5.4

Linux>>Linux_kernel >> Version 2.5.5

Linux>>Linux_kernel >> Version 2.5.6

Linux>>Linux_kernel >> Version 2.5.7

Linux>>Linux_kernel >> Version 2.5.8

Linux>>Linux_kernel >> Version 2.5.9

Linux>>Linux_kernel >> Version 2.5.10

Linux>>Linux_kernel >> Version 2.5.11

Linux>>Linux_kernel >> Version 2.5.12

Linux>>Linux_kernel >> Version 2.5.13

Linux>>Linux_kernel >> Version 2.5.14

Linux>>Linux_kernel >> Version 2.5.15

Linux>>Linux_kernel >> Version 2.5.16

Linux>>Linux_kernel >> Version 2.5.17

Linux>>Linux_kernel >> Version 2.5.18

Linux>>Linux_kernel >> Version 2.5.19

Linux>>Linux_kernel >> Version 2.5.20

Linux>>Linux_kernel >> Version 2.5.21

Linux>>Linux_kernel >> Version 2.5.22

Linux>>Linux_kernel >> Version 2.5.23

Linux>>Linux_kernel >> Version 2.5.24

Linux>>Linux_kernel >> Version 2.5.25

Linux>>Linux_kernel >> Version 2.5.26

Linux>>Linux_kernel >> Version 2.5.27

Linux>>Linux_kernel >> Version 2.5.28

Linux>>Linux_kernel >> Version 2.5.29

Linux>>Linux_kernel >> Version 2.5.30

Linux>>Linux_kernel >> Version 2.5.31

Linux>>Linux_kernel >> Version 2.5.32

Linux>>Linux_kernel >> Version 2.5.33

Linux>>Linux_kernel >> Version 2.5.34

Linux>>Linux_kernel >> Version 2.5.35

Linux>>Linux_kernel >> Version 2.5.36

Linux>>Linux_kernel >> Version 2.5.37

Linux>>Linux_kernel >> Version 2.5.38

Linux>>Linux_kernel >> Version 2.5.39

Linux>>Linux_kernel >> Version 2.5.40

Linux>>Linux_kernel >> Version 2.5.41

Linux>>Linux_kernel >> Version 2.5.42

Linux>>Linux_kernel >> Version 2.5.43

Linux>>Linux_kernel >> Version 2.5.44

Linux>>Linux_kernel >> Version 2.5.45

Linux>>Linux_kernel >> Version 2.5.46

Linux>>Linux_kernel >> Version 2.5.47

Linux>>Linux_kernel >> Version 2.5.48

Linux>>Linux_kernel >> Version 2.5.49

Linux>>Linux_kernel >> Version 2.5.50

Linux>>Linux_kernel >> Version 2.5.51

Linux>>Linux_kernel >> Version 2.5.52

Linux>>Linux_kernel >> Version 2.5.53

Linux>>Linux_kernel >> Version 2.5.54

Linux>>Linux_kernel >> Version 2.5.55

Linux>>Linux_kernel >> Version 2.5.56

Linux>>Linux_kernel >> Version 2.5.57

Linux>>Linux_kernel >> Version 2.5.58

Linux>>Linux_kernel >> Version 2.5.59

Linux>>Linux_kernel >> Version 2.5.60

Linux>>Linux_kernel >> Version 2.5.61

Linux>>Linux_kernel >> Version 2.5.62

Linux>>Linux_kernel >> Version 2.5.63

Linux>>Linux_kernel >> Version 2.5.64

Linux>>Linux_kernel >> Version 2.5.65

Linux>>Linux_kernel >> Version 2.5.66

Linux>>Linux_kernel >> Version 2.5.67

Linux>>Linux_kernel >> Version 2.5.68

Linux>>Linux_kernel >> Version 2.5.69

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.0

Linux>>Linux_kernel >> Version 2.6.1

Linux>>Linux_kernel >> Version 2.6.1

Linux>>Linux_kernel >> Version 2.6.1

Linux>>Linux_kernel >> Version 2.6.2

Linux>>Linux_kernel >> Version 2.6.3

Linux>>Linux_kernel >> Version 2.6.4

Linux>>Linux_kernel >> Version 2.6.5

Linux>>Linux_kernel >> Version 2.6.6

Linux>>Linux_kernel >> Version 2.6.6

Linux>>Linux_kernel >> Version 2.6.7

Linux>>Linux_kernel >> Version 2.6.7

Linux>>Linux_kernel >> Version 2.6.8

Linux>>Linux_kernel >> Version 2.6.8

Linux>>Linux_kernel >> Version 2.6.8

Linux>>Linux_kernel >> Version 2.6.8

Linux>>Linux_kernel >> Version 2.6.9

    Linux>>Linux_kernel >> Version 2.6.10

    Linux>>Linux_kernel >> Version 2.6.10

    Linux>>Linux_kernel >> Version 2.6.11

    Linux>>Linux_kernel >> Version 2.6.11

    Linux>>Linux_kernel >> Version 2.6.11

    Linux>>Linux_kernel >> Version 2.6.11

    Linux>>Linux_kernel >> Version 2.6.11.5

    Linux>>Linux_kernel >> Version 2.6.11.6

    Linux>>Linux_kernel >> Version 2.6_test9_cvs

      References

      http://www.redhat.com/support/errata/RHSA-2005-420.html
      Tags : vendor-advisory, x_refsource_REDHAT
      http://www.securityfocus.com/archive/1/427980/100/0/threaded
      Tags : vendor-advisory, x_refsource_FEDORA