{ "id": "CVE-2006-2629", "sourceIdentifier": "cve@mitre.org", "published": "2006-05-27T10:02:00.000", "lastModified": "2017-07-20T01:31:38.473", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h." }, { "lang": "es", "value": "Condici\u00f3n de carrera en el kernel de Linux 2.6.15 hasta la versi\u00f3n 2.6.17, cuando se est\u00e1 ejecutado en plataformas SMP, permite a usuarios locales provocar una denegaci\u00f3n de servicio (ca\u00edda) creando y finalizando un gran n\u00famero de tareas, posteriormente accediendo a entrada /proc de una tarea que est\u00e1 finalizando, lo que provoca corrupci\u00f3n de memoria que conduce a un fallo en la funci\u00f3n prune_dcache o un error BUG_ON en include/linux/list.h." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "accessVector": "LOCAL", "accessComplexity": "HIGH", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0 }, "baseSeverity": "MEDIUM", "exploitabilityScore": 1.9, "impactScore": 6.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*", "matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*", "matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*", "matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*", "matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*", "matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*", "matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*", "matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*", "matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*", "matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*", "matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*", "matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*", "matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*", "matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*", "matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*", "matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*", "matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*", "matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*", "matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*", "matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*", "matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*", "matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*", "matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*", "matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*", "matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*", "matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*", "matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*", "matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*", "matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*", "matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*", "matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*", "matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*", "matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*", "matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*", "matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*", "matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572" }, { "vulnerable": true, "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*", "matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897" } ] } ] } ], "references": [ { "url": "http://marc.info/?l=linux-kernel&m=114860432801543&w=2", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/18183", "source": "cve@mitre.org" }, { "url": "http://www.vupen.com/english/advisories/2006/2070", "source": "cve@mitre.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26746", "source": "cve@mitre.org" } ] }