U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2005-2492

Change History

Modified Analysis by NIST 11/18/2016 11:51:00 AM

Action Type Old Value New Value
Changed CPE Configuration
Configuration 1
     OR
          *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*
Configuration 1
     OR
          *cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
          *cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
          *cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*
Configuration 2
     OR
          *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
          *cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*
Added CWE

								
							
							
						
CWE-264
Changed Reference Type
http://marc.info/?l=bugtraq&m=112690609622266&w=2 No Types Assigned
http://marc.info/?l=bugtraq&m=112690609622266&w=2 Mailing List
Changed Reference Type
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11031 No Types Assigned
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:11031 Not Applicable
Changed Reference Type
http://secunia.com/advisories/16747/ Vendor Advisory
http://secunia.com/advisories/16747/ Third Party Advisory, Permissions Required
Changed Reference Type
http://secunia.com/advisories/17073 No Types Assigned
http://secunia.com/advisories/17073 Third Party Advisory, Permissions Required
Changed Reference Type
http://secunia.com/advisories/17918 No Types Assigned
http://secunia.com/advisories/17918 Third Party Advisory, Permissions Required
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Vendor Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-514.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-514.html Not Applicable
Changed Reference Type
http://www.securityfocus.com/archive/1/archive/1/419522/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/419522/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/archive/1/427980/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/archive/1/427980/100/0/threaded Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/14787 No Types Assigned
http://www.securityfocus.com/bid/14787 Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/usn-178-1 No Types Assigned
http://www.ubuntu.com/usn/usn-178-1 Third Party Advisory
Changed Reference Type
http://xforce.iss.net/xforce/xfdb/22218 No Types Assigned
http://xforce.iss.net/xforce/xfdb/22218 Third Party Advisory, VDB Entry
Changed Reference Type
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830 Patch
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166830 Issue Tracking, Patch