{ "id": "CVE-2006-2451", "sourceIdentifier": "secalert@redhat.com", "published": "2006-07-07T18:05:00.000", "lastModified": "2024-11-21T00:11:20.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions." }, { "lang": "es", "value": "El soporte suid_dumpable de Linux kernel 2.6.13 hasta versiones anteriores a 2.6.17.4, y 2.6.16 anterior a 2.6.16.24, permite a usuarios locales provocar una denegaci\u00f3n de servicio (agotamiento de disco) y posiblemente obtener privilegios a trav\u00e9s del argumento PR_SET_DUMPABLE de la funci\u00f3n prctl y un programa que provoca que se cree un fichero de volcado de memoria (core dump) en un directorio en el que el usuario no tiene permisos." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "baseScore": 4.6, "accessVector": "LOCAL", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 3.9, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": true, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-399" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*", "matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*", "matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*", "matchCriteriaId": "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*", "matchCriteriaId": "F87F764B-4097-44FA-B96E-A5DA75E31F7B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*", "matchCriteriaId": "D7025803-C679-44DB-ADEE-864E6CAAD9B5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*", "matchCriteriaId": "24B879D6-4631-49A8-9366-75577DFB755D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*", "matchCriteriaId": "C5B76C21-70C8-4911-A24B-270F876EF7C0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*", "matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*", "matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*", "matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*", "matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*", "matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*", "matchCriteriaId": "390B1E09-7014-4A74-834C-806BBEBAF6F4" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*", "matchCriteriaId": "FEF02479-2124-4655-A38D-A4793D3B8A1A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*", "matchCriteriaId": "0FB5CF04-B5B6-4DFB-B051-61EDA257019F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*", "matchCriteriaId": "A89DC9CD-C06F-4B9B-B376-900E65016296" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*", "matchCriteriaId": "15BED7A7-3E96-43EF-8B6F-3C94897C3AA1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*", "matchCriteriaId": "8C6FCAC4-B6C6-4125-B3AC-F30407AA7738" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*", "matchCriteriaId": "707ECC75-65B6-4B02-BE85-A4804549A2DD" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*", "matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*", "matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*", "matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*", "matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*", "matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*", "matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*", "matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*", "matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78" } ] } ] } ], "references": [ { "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195902", "source": "secalert@redhat.com" }, { "url": "http://secunia.com/advisories/20953", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20960", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20965", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20986", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20991", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21179", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21498", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21966", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016451", "source": "secalert@redhat.com" }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-162.htm", "source": "secalert@redhat.com" }, { "url": "http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=0af184bb9f80edfbb94de46cb52e9592e5a547b0", "source": "secalert@redhat.com" }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.24", "source": "secalert@redhat.com" }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4", "source": "secalert@redhat.com" }, { "url": "http://www.novell.com/linux/security/advisories/2006_16_sr.html", "source": "secalert@redhat.com" }, { "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html", "source": "secalert@redhat.com" }, { "url": "http://www.novell.com/linux/security/advisories/2006_42_kernel.html", "source": "secalert@redhat.com" }, { "url": "http://www.novell.com/linux/security/advisories/2006_47_kernel.html", "source": "secalert@redhat.com" }, { "url": "http://www.novell.com/linux/security/advisories/2006_49_kernel.html", "source": "secalert@redhat.com" }, { "url": "http://www.osvdb.org/27030", "source": "secalert@redhat.com" }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0574.html", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/439483/100/100/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/439610/100/100/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/439869/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/440057/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/440117/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/440118/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/archive/1/440379/100/0/threaded", "source": "secalert@redhat.com" }, { "url": "http://www.securityfocus.com/bid/18874", "source": "secalert@redhat.com" }, { "url": "http://www.ubuntu.com/usn/usn-311-1", "source": "secalert@redhat.com" }, { "url": "http://www.vupen.com/english/advisories/2006/2699", "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ] }, { "url": "https://issues.rpath.com/browse/RPL-488", "source": "secalert@redhat.com" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11336", "source": "secalert@redhat.com" }, { "url": "http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=195902", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/20953", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20960", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20965", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20986", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20991", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21179", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21498", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21966", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016451", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-162.htm", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.17.y.git%3Ba=commit%3Bh=0af184bb9f80edfbb94de46cb52e9592e5a547b0", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.24", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.4", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2006_16_sr.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2006_17_sr.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2006_42_kernel.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2006_47_kernel.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.novell.com/linux/security/advisories/2006_49_kernel.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.osvdb.org/27030", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0574.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/439483/100/100/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/439610/100/100/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/439869/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/440057/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/440117/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/440118/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/440379/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/18874", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.ubuntu.com/usn/usn-311-1", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/2699", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "https://issues.rpath.com/browse/RPL-488", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11336", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }