CVE-2006-2629
Published May 27, 2006
Last updated 7 years ago
Overview
- Description
- Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4
- Impact score
- 6.9
- Exploitability score
- 1.9
- Vector string
- AV:L/AC:H/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572" }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897" } ], "operator": "OR" } ] } ]