CVE-2006-1055

The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read.
References
Link Resource
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19495
http://secunia.com/advisories/19735
http://secunia.com/advisories/19955
http://secunia.com/advisories/20398
http://secunia.com/advisories/20716
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/24443
http://www.securityfocus.com/bid/17402
http://www.trustix.org/errata/2006/0020
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1273
http://www.vupen.com/english/advisories/2006/1475
https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
https://usn.ubuntu.com/281-1/
http://lwn.net/Alerts/180820/
http://secunia.com/advisories/19495
http://secunia.com/advisories/19735
http://secunia.com/advisories/19955
http://secunia.com/advisories/20398
http://secunia.com/advisories/20716
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba
http://www.novell.com/linux/security/advisories/2006-05-31.html
http://www.osvdb.org/24443
http://www.securityfocus.com/bid/17402
http://www.trustix.org/errata/2006/0020
http://www.ubuntu.com/usn/usn-302-1
http://www.vupen.com/english/advisories/2006/1273
http://www.vupen.com/english/advisories/2006/1475
https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
https://usn.ubuntu.com/281-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*

History

21 Nov 2024, 00:07

Type Values Removed Values Added
References () http://lwn.net/Alerts/180820/ - () http://lwn.net/Alerts/180820/ -
References () http://secunia.com/advisories/19495 - () http://secunia.com/advisories/19495 -
References () http://secunia.com/advisories/19735 - () http://secunia.com/advisories/19735 -
References () http://secunia.com/advisories/19955 - () http://secunia.com/advisories/19955 -
References () http://secunia.com/advisories/20398 - () http://secunia.com/advisories/20398 -
References () http://secunia.com/advisories/20716 - () http://secunia.com/advisories/20716 -
References () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825 - () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825 -
References () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba - () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba -
References () http://www.novell.com/linux/security/advisories/2006-05-31.html - () http://www.novell.com/linux/security/advisories/2006-05-31.html -
References () http://www.osvdb.org/24443 - () http://www.osvdb.org/24443 -
References () http://www.securityfocus.com/bid/17402 - () http://www.securityfocus.com/bid/17402 -
References () http://www.trustix.org/errata/2006/0020 - () http://www.trustix.org/errata/2006/0020 -
References () http://www.ubuntu.com/usn/usn-302-1 - () http://www.ubuntu.com/usn/usn-302-1 -
References () http://www.vupen.com/english/advisories/2006/1273 - () http://www.vupen.com/english/advisories/2006/1273 -
References () http://www.vupen.com/english/advisories/2006/1475 - () http://www.vupen.com/english/advisories/2006/1475 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/25693 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/25693 -
References () https://usn.ubuntu.com/281-1/ - () https://usn.ubuntu.com/281-1/ -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=6e0dd741a89be35defa05bd79f4211c5a2762825;hp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba', 'name': 'http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=6e0dd741a89be35defa05bd79f4211c5a2762825;hp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba', 'tags': ['Exploit', 'Patch'], 'refsource': 'CONFIRM'}
  • {'url': 'http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e0dd741a89be35defa05bd79f4211c5a2762825', 'name': 'http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6e0dd741a89be35defa05bd79f4211c5a2762825', 'tags': ['Patch'], 'refsource': 'CONFIRM'}
  • () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825 -
  • () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp=597a7679dd83691be2f3a53e1f3f915b4a7f6eba -

Information

Published : 2006-04-05 17:04

Updated : 2024-11-21 00:07


NVD link : CVE-2006-1055

Mitre link : CVE-2006-1055

CVE.ORG link : CVE-2006-1055


JSON object : View

Products Affected

linux

  • linux_kernel