CVE-2006-4814

The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.
References
Link Resource
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
http://rhn.redhat.com/errata/RHSA-2007-0014.html
http://secunia.com/advisories/23436 Vendor Advisory
http://secunia.com/advisories/23609 Vendor Advisory
http://secunia.com/advisories/23997 Vendor Advisory
http://secunia.com/advisories/24098 Vendor Advisory
http://secunia.com/advisories/24100 Vendor Advisory
http://secunia.com/advisories/24206 Vendor Advisory
http://secunia.com/advisories/24482 Vendor Advisory
http://secunia.com/advisories/25691 Vendor Advisory
http://secunia.com/advisories/25714 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://secunia.com/advisories/30110 Vendor Advisory
http://secunia.com/advisories/31246 Vendor Advisory
http://secunia.com/advisories/33280 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
http://www.debian.org/security/2007/dsa-1304 Patch
http://www.debian.org/security/2008/dsa-1503 Patch
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6
http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
http://www.novell.com/linux/security/advisories/2007_18_kernel.html
http://www.redhat.com/support/errata/RHSA-2008-0211.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.securityfocus.com/archive/1/471457
http://www.securityfocus.com/bid/21663 Patch
http://www.trustix.org/errata/2007/0002/
http://www.ubuntu.com/usn/usn-416-1
http://www.vupen.com/english/advisories/2006/5082 Vendor Advisory
http://www.vupen.com/english/advisories/2008/2222/references Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
http://rhn.redhat.com/errata/RHSA-2007-0014.html
http://secunia.com/advisories/23436 Vendor Advisory
http://secunia.com/advisories/23609 Vendor Advisory
http://secunia.com/advisories/23997 Vendor Advisory
http://secunia.com/advisories/24098 Vendor Advisory
http://secunia.com/advisories/24100 Vendor Advisory
http://secunia.com/advisories/24206 Vendor Advisory
http://secunia.com/advisories/24482 Vendor Advisory
http://secunia.com/advisories/25691 Vendor Advisory
http://secunia.com/advisories/25714 Vendor Advisory
http://secunia.com/advisories/29058 Vendor Advisory
http://secunia.com/advisories/30110 Vendor Advisory
http://secunia.com/advisories/31246 Vendor Advisory
http://secunia.com/advisories/33280 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
http://www.debian.org/security/2007/dsa-1304 Patch
http://www.debian.org/security/2008/dsa-1503 Patch
http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6
http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
http://www.novell.com/linux/security/advisories/2007_18_kernel.html
http://www.redhat.com/support/errata/RHSA-2008-0211.html
http://www.redhat.com/support/errata/RHSA-2008-0787.html
http://www.securityfocus.com/archive/1/471457
http://www.securityfocus.com/bid/21663 Patch
http://www.trustix.org/errata/2007/0002/
http://www.ubuntu.com/usn/usn-416-1
http://www.vupen.com/english/advisories/2006/5082 Vendor Advisory
http://www.vupen.com/english/advisories/2008/2222/references Vendor Advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://lists.vmware.com/pipermail/security-announce/2008/000023.html - () http://lists.vmware.com/pipermail/security-announce/2008/000023.html -
References () http://rhn.redhat.com/errata/RHSA-2007-0014.html - () http://rhn.redhat.com/errata/RHSA-2007-0014.html -
References () http://secunia.com/advisories/23436 - Vendor Advisory () http://secunia.com/advisories/23436 - Vendor Advisory
References () http://secunia.com/advisories/23609 - Vendor Advisory () http://secunia.com/advisories/23609 - Vendor Advisory
References () http://secunia.com/advisories/23997 - Vendor Advisory () http://secunia.com/advisories/23997 - Vendor Advisory
References () http://secunia.com/advisories/24098 - Vendor Advisory () http://secunia.com/advisories/24098 - Vendor Advisory
References () http://secunia.com/advisories/24100 - Vendor Advisory () http://secunia.com/advisories/24100 - Vendor Advisory
References () http://secunia.com/advisories/24206 - Vendor Advisory () http://secunia.com/advisories/24206 - Vendor Advisory
References () http://secunia.com/advisories/24482 - Vendor Advisory () http://secunia.com/advisories/24482 - Vendor Advisory
References () http://secunia.com/advisories/25691 - Vendor Advisory () http://secunia.com/advisories/25691 - Vendor Advisory
References () http://secunia.com/advisories/25714 - Vendor Advisory () http://secunia.com/advisories/25714 - Vendor Advisory
References () http://secunia.com/advisories/29058 - Vendor Advisory () http://secunia.com/advisories/29058 - Vendor Advisory
References () http://secunia.com/advisories/30110 - Vendor Advisory () http://secunia.com/advisories/30110 - Vendor Advisory
References () http://secunia.com/advisories/31246 - Vendor Advisory () http://secunia.com/advisories/31246 - Vendor Advisory
References () http://secunia.com/advisories/33280 - Vendor Advisory () http://secunia.com/advisories/33280 - Vendor Advisory
References () http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm - () http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm -
References () http://www.debian.org/security/2007/dsa-1304 - Patch () http://www.debian.org/security/2007/dsa-1304 - Patch
References () http://www.debian.org/security/2008/dsa-1503 - Patch () http://www.debian.org/security/2008/dsa-1503 - Patch
References () http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6 - () http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:040 -
References () http://www.mandriva.com/security/advisories?name=MDKSA-2007:060 - () http://www.mandriva.com/security/advisories?name=MDKSA-2007:060 -
References () http://www.novell.com/linux/security/advisories/2007_18_kernel.html - () http://www.novell.com/linux/security/advisories/2007_18_kernel.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0211.html - () http://www.redhat.com/support/errata/RHSA-2008-0211.html -
References () http://www.redhat.com/support/errata/RHSA-2008-0787.html - () http://www.redhat.com/support/errata/RHSA-2008-0787.html -
References () http://www.securityfocus.com/archive/1/471457 - () http://www.securityfocus.com/archive/1/471457 -
References () http://www.securityfocus.com/bid/21663 - Patch () http://www.securityfocus.com/bid/21663 - Patch
References () http://www.trustix.org/errata/2007/0002/ - () http://www.trustix.org/errata/2007/0002/ -
References () http://www.ubuntu.com/usn/usn-416-1 - () http://www.ubuntu.com/usn/usn-416-1 -
References () http://www.vupen.com/english/advisories/2006/5082 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/5082 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2008/2222/references - Vendor Advisory () http://www.vupen.com/english/advisories/2008/2222/references - Vendor Advisory
References () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 - () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648 -

Information

Published : 2006-12-20 02:28

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4814

Mitre link : CVE-2006-4814

CVE.ORG link : CVE-2006-4814


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-399

Resource Management Errors