Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-2708

Опубликовано: 28 июн. 2005
Источник: redhat
EPSS Низкий

Описание

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.

Дополнительная информация

Статус:

Important

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.

nvd
почти 20 лет назад

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.

debian
почти 20 лет назад

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64 ...

github
больше 3 лет назад

The search_binary_handler function in exec.c in Linux 2.4 kernel on 64-bit x86 architectures does not check a return code for a particular function call when virtual memory is low, which allows local users to cause a denial of service (panic), as demonstrated by running a process using the bash ulimit -v command.

EPSS

Процентиль: 28%
0.00097
Низкий