CVE-2006-4814

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.

References

http://lists.vmware.com/pipermail/security-announce/2008/000023.html

http://rhn.redhat.com/errata/RHSA-2007-0014.html

http://secunia.com/advisories/23436

http://secunia.com/advisories/23609

http://secunia.com/advisories/23997

http://secunia.com/advisories/24098

http://secunia.com/advisories/24100

http://secunia.com/advisories/24206

http://secunia.com/advisories/24482

http://secunia.com/advisories/25691

http://secunia.com/advisories/25714

http://secunia.com/advisories/29058

http://secunia.com/advisories/30110

http://secunia.com/advisories/31246

http://secunia.com/advisories/33280

http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm

http://www.debian.org/security/2007/dsa-1304

http://www.debian.org/security/2008/dsa-1503

http://www.kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.6

http://www.mandriva.com/security/advisories?name=MDKSA-2007:040

http://www.mandriva.com/security/advisories?name=MDKSA-2007:060

http://www.novell.com/linux/security/advisories/2007_18_kernel.html

http://www.redhat.com/support/errata/RHSA-2008-0211.html

http://www.redhat.com/support/errata/RHSA-2008-0787.html

http://www.securityfocus.com/archive/1/471457

http://www.securityfocus.com/bid/21663

http://www.trustix.org/errata/2007/0002/

http://www.ubuntu.com/usn/usn-416-1

http://www.vupen.com/english/advisories/2006/5082

http://www.vupen.com/english/advisories/2008/2222/references

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648

Details

Source: MITRE

Published: 2006-12-20

Updated: 2017-10-11

Type: CWE-399

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:S/C:N/I:N/A:C

Impact Score: 6.9

Exploitability Score: 3.1

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test10:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test11:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test12:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.0:test9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:*:x86:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.18:pre8:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.19:pre6:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.21:pre7:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.22:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.23:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.23:pre9:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.23_ow2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.24:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.24_ow1:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.25:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.26:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:pre3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:pre4:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.27:pre5:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.28:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.29:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.29:rc1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.29:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.30:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.30:rc2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.30:rc3:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.31:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.31:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.32:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.32:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.32:pre2:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33:pre1:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33.2:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33.3:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:2.4.33.4:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to 2.4.33.5 (inclusive)

Tenable Plugins

View all (18 total)

IDNameProductFamilySeverity
67678Oracle Linux 3 : kernel (ELSA-2008-0211)NessusOracle Linux Local Security Checks
high
67438Oracle Linux 4 : kernel (ELSA-2007-0014)NessusOracle Linux Local Security Checks
high
60393Scientific Linux Security Update : kernel on SL3.x i386/x86_64NessusScientific Linux Local Security Checks
high
59122SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 2605)NessusSuSE Local Security Checks
high
40380VMSA-2008-0011 : Updated ESX service console packages for Samba and vmnixNessusVMware ESX Local Security Checks
high
36838CentOS 4 : kernel (CESA-2007:0014)NessusCentOS Local Security Checks
high
35323RHEL 2.1 : kernel (RHSA-2009:0001)NessusRed Hat Local Security Checks
high
32160RHEL 3 : kernel (RHSA-2008:0211)NessusRed Hat Local Security Checks
high
32139CentOS 3 : kernel (CESA-2008:0211)NessusCentOS Local Security Checks
high
31147Debian DSA-1503-1 : kernel-source-2.4.27 - several vulnerabilitiesNessusDebian Local Security Checks
high
29486SuSE 10 Security Update : Linux kernel (ZYPP Patch Number 2606)NessusSuSE Local Security Checks
high
28005Ubuntu 5.10 / 6.06 LTS / 6.10 : linux-source-2.6.12/2.6.15/2.6.17 vulnerabilities (USN-416-1)NessusUbuntu Local Security Checks
high
27292openSUSE 10 Security Update : kernel (kernel-2635)NessusSuSE Local Security Checks
high
25529Debian DSA-1304-1 : kernel-source-2.6.8 - several vulnerabilitiesNessusDebian Local Security Checks
high
24810Mandrake Linux Security Advisory : kernel (MDKSA-2007:060)NessusMandriva Local Security Checks
high
24653Mandrake Linux Security Advisory : kernel (MDKSA-2007:040)NessusMandriva Local Security Checks
high
24315RHEL 4 : kernel (RHSA-2007:0014)NessusRed Hat Local Security Checks
high
801424CentOS RHSA-2007-0014 Security CheckLog Correlation EngineGeneric
high