{ "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2006-2936", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The ftdi_sio driver (usb/serial/ftdi_sio.c) in Linux kernel 2.6.x up to 2.6.17, and possibly later versions, allows local users to cause a denial of service (memory consumption) by writing more data to the serial port than the hardware can handle, which causes the data to be queued." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git;a=blob;h=4b4d9cfea17618b80d3ac785b701faeaf60141f1;hb=396eb2aac550ec55856c6843ef9017e800c3d656", "refsource": "CONFIRM", "url": "http://www.kernel.org/git/?p=linux/kernel/git/gregkh/patches.git;a=blob;h=4b4d9cfea17618b80d3ac785b701faeaf60141f1;hb=396eb2aac550ec55856c6843ef9017e800c3d656" }, { "name": "20703", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/20703" }, { "name": "USN-331-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-331-1" }, { "name": "21934", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21934" }, { "name": "linux-ftdi-sio-dos(27807)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27807" }, { "name": "19033", "refsource": "BID", "url": "http://www.securityfocus.com/bid/19033" }, { "name": "27119", "refsource": "OSVDB", "url": "http://www.osvdb.org/27119" }, { "name": "ADV-2006-2841", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/2841" }, { "name": "RHSA-2006:0617", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0617.html" }, { "name": "21298", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21298" }, { "name": "21057", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21057" }, { "name": "21605", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21605" }, { "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=197610" }, { "name": "MDKSA-2006:150", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:150" }, { "name": "SUSE-SA:2007:021", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_21_kernel.html" }, { "name": "MDKSA-2006:151", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:151" }, { "name": "25226", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25226" }, { "name": "21614", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/21614" }, { "name": "25683", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/25683" }, { "name": "22174", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22174" }, { "name": "oval:org.mitre.oval:def:10265", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10265" }, { "name": "USN-346-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/usn-346-1" }, { "name": "SUSE-SA:2007:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_18_kernel.html" }, { "name": "24547", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24547" }, { "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm", "refsource": "CONFIRM", "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm" }, { "name": "SUSE-SA:2007:030", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_30_kernel.html" }, { "name": "SUSE-SA:2007:035", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2007_35_kernel.html" }, { "name": "22093", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/22093" }, { "name": "20060717 rPSA-2006-0130-1 kernel", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/440300/100/0/threaded" }, { "name": "DSA-1184", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2006/dsa-1184" } ] } }