The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:18
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=linux-kernel&m=113476665626446&w=2 - Mailing List | |
References | () http://marc.info/?l=linux-kernel&m=113494474208973&w=2 - Mailing List, Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2007-0488.html - Third Party Advisory | |
References | () http://secunia.com/advisories/23361 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23384 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/23752 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/25838 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/26289 - Broken Link | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm - Third Party Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9b5b1f5bf9dcdb6f23abf65977a675eb4deba3c0 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 - Patch, Third Party Advisory | |
References | () http://www.novell.com/linux/security/advisories/2006_57_kernel.html - Broken Link | |
References | () http://www.securityfocus.com/bid/21581 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-395-1 - Third Party Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10128 - Broken Link |
15 Feb 2024, 20:23
Type | Values Removed | Values Added |
---|---|---|
First Time |
Canonical
Canonical ubuntu Linux Redhat enterprise Linux Server Redhat Redhat enterprise Linux Eus Redhat enterprise Linux Workstation Redhat enterprise Linux Desktop |
|
References | (MLIST) http://marc.info/?l=linux-kernel&m=113476665626446&w=2 - Mailing List | |
References | (MLIST) http://marc.info/?l=linux-kernel&m=113494474208973&w=2 - Mailing List, Patch | |
References | (BID) http://www.securityfocus.com/bid/21581 - Broken Link, Third Party Advisory, VDB Entry | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10128 - Broken Link | |
References | (UBUNTU) http://www.ubuntu.com/usn/usn-395-1 - Third Party Advisory | |
References | (MANDRIVA) http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 - Patch, Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/23384 - Broken Link, Vendor Advisory | |
References | (CONFIRM) http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm - Third Party Advisory | |
References | (SECUNIA) http://secunia.com/advisories/25838 - Broken Link, Vendor Advisory | |
References | (SUSE) http://www.novell.com/linux/security/advisories/2006_57_kernel.html - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/26289 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/23752 - Broken Link, Vendor Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9b5b1f5bf9dcdb6f23abf65977a675eb4deba3c0 - Broken Link | |
References | (SECUNIA) http://secunia.com/advisories/23361 - Broken Link, Vendor Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2007-0488.html - Third Party Advisory | |
CWE | CWE-667 | |
CPE | cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* |
cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:4.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:4.5:*:*:*:*:*:*:* |
CVSS |
v2 : v3 : |
v2 : 3.3
v3 : 7.5 |
07 Nov 2023, 01:59
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2006-10-05 04:04
Updated : 2024-11-21 00:18
NVD link : CVE-2006-5158
Mitre link : CVE-2006-5158
CVE.ORG link : CVE-2006-5158
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_eus
- enterprise_linux_workstation
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-667
Improper Locking