U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2005-3274

Change History

Modified Analysis by NIST 1/20/2024 8:26:05 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.4.0 up to (including) 2.4.31
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions from (including) 2.6.0 up to (excluding) 2.6.13
Added CVSS V3.1

								
							
							
						
NIST AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-476
Removed CWE
NIST NVD-CWE-Other

								
						
Changed Reference Type
http://lkml.org/lkml/2005/6/23/249 No Types Assigned
http://lkml.org/lkml/2005/6/23/249 Mailing List, Patch
Changed Reference Type
http://lkml.org/lkml/2005/6/24/173 No Types Assigned
http://lkml.org/lkml/2005/6/24/173 Mailing List, Patch
Changed Reference Type
http://secunia.com/advisories/17826 No Types Assigned
http://secunia.com/advisories/17826 Broken Link
Changed Reference Type
http://secunia.com/advisories/18056 No Types Assigned
http://secunia.com/advisories/18056 Broken Link
Changed Reference Type
http://secunia.com/advisories/18684 No Types Assigned
http://secunia.com/advisories/18684 Broken Link
Changed Reference Type
http://secunia.com/advisories/18977 No Types Assigned
http://secunia.com/advisories/18977 Broken Link
Changed Reference Type
http://www.debian.org/security/2005/dsa-922 No Types Assigned
http://www.debian.org/security/2005/dsa-922 Third Party Advisory
Changed Reference Type
http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d No Types Assigned
http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba=commit%3Bh=e684f066dff5628bb61ad1912de6e8058b5b4c7d Patch
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218 Patch, Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219 Patch, Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220 Patch, Third Party Advisory
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2005:235 Patch, Third Party Advisory
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2005-663.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2005-663.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2006-0190.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2006-0190.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/427980/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/427980/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/archive/1/427981/100/0/threaded No Types Assigned
http://www.securityfocus.com/archive/1/427981/100/0/threaded Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/15528 No Types Assigned
http://www.securityfocus.com/bid/15528 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044 No Types Assigned
http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:044 Product
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723 Broken Link
Changed Reference Type
https://usn.ubuntu.com/219-1/ No Types Assigned
https://usn.ubuntu.com/219-1/ Broken Link