Description
Linux kernel 2.4.x and 2.6.x allows local users to cause a denial of service (CPU and memory consumption) and bypass RLIM_MEMLOCK limits via the mlockall call.
Product(s):
- Linux Kernel 2.4.0
- Linux Kernel 2.4.0 test10
- Linux Kernel 2.4.0 test11
- Linux Kernel 2.4.0 test12
- Linux Kernel 2.4.0 test1
- Linux Kernel 2.4.0 test2
- Linux Kernel 2.4.0 test3
- Linux Kernel 2.4.0 test4
- Linux Kernel 2.4.0 test5
- Linux Kernel 2.4.0 test6
- Linux Kernel 2.4.0 test7
- Linux Kernel 2.4.0 test8
- Linux Kernel 2.4.0 test9
- Linux Kernel 2.4.10
- Linux Kernel 2.4.11
- Linux Kernel 2.4.11 pre3
- Linux Kernel 2.4.12
- Linux Kernel 2.4.13
- Linux Kernel 2.4.14
- Linux Kernel 2.4.15
- Linux Kernel 2.4.16
- Linux Kernel 2.4.17
- Linux Kernel 2.4.18
- Linux Kernel 2.4.18 on X86
- Linux Kernel 2.4.18 pre1
- Linux Kernel 2.4.18 pre2
- Linux Kernel 2.4.18 pre3
- Linux Kernel 2.4.18 pre4
- Linux Kernel 2.4.18 pre5
- Linux Kernel 2.4.18 pre6
- Linux Kernel 2.4.18 pre7
- Linux Kernel 2.4.18 pre8
- Linux Kernel 2.4.18 pre9
- Linux Kernel 2.4.19
- Linux Kernel 2.4.19 pre1
- Linux Kernel 2.4.19 pre2
- Linux Kernel 2.4.19 pre3
- Linux Kernel 2.4.19 pre4
- Linux Kernel 2.4.19 pre5
- Linux Kernel 2.4.19 pre6
- Linux Kernel 2.4.1
- Linux Kernel 2.4.20
- Linux Kernel 2.4.21
- Linux Kernel 2.4.21 pre1
- Linux Kernel 2.4.21 pre4
- Linux Kernel 2.4.21 pre7
- Linux Kernel 2.4.22
- Linux Kernel 2.4.22 pre10
- Linux Kernel 2.4.23
- Linux Kernel 2.4.23 pre9
- Linux Linux Kernel 2.4.23 OW2
- Linux Kernel 2.4.24
- Linux Linux Kernel 2.4.24 OW1
- Linux Kernel 2.4.25
- Linux Kernel 2.4.26
- Linux Kernel 2.4.27
- Linux Kernel 2.4.27 pre1
- Linux Kernel 2.4.27 pre2
- Linux Kernel 2.4.27 pre3
- Linux Kernel 2.4.27 pre4
- Linux Kernel 2.4.27 pre5
- Linux Kernel 2.4.28
- Linux Kernel 2.4.29
- Linux Kernel 2.4.29 rc1
- Linux Kernel 2.4.29 rc2
- Linux Kernel 2.4.2
- Linux Kernel 2.4.30
- Linux Kernel 2.4.30 rc2
- Linux Kernel 2.4.30 rc3
- Linux Kernel 2.4.31 pre1
- Linux Kernel 2.4.3
- Linux Kernel 2.4.3 pre3
- Linux Kernel 2.4.4
- Linux Kernel 2.4.5
- Linux Kernel 2.4.6
- Linux Kernel 2.4.7
- Linux Kernel 2.4.8
- Linux Kernel 2.4.9
- Linux Kernel 2.6.0
- Linux Kernel 2.6 test10
- Linux Kernel 2.6 test11
- Linux Kernel 2.6 test1
- Linux Kernel 2.6 test2
- Linux Kernel 2.6 test3
- Linux Kernel 2.6 test4
- Linux Kernel 2.6 test5
- Linux Kernel 2.6 test6
- Linux Kernel 2.6 test7
- +68 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0179, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0179 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.