The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 00:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 - Exploit, Issue Tracking | |
References | () http://secunia.com/advisories/22253 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22279 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22292 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22497 - Broken Link | |
References | () http://secunia.com/advisories/22762 - Broken Link | |
References | () http://secunia.com/advisories/22945 - Broken Link | |
References | () http://secunia.com/advisories/23064 - Broken Link | |
References | () http://secunia.com/advisories/23370 - Broken Link | |
References | () http://secunia.com/advisories/23384 - Broken Link | |
References | () http://secunia.com/advisories/23395 - Broken Link | |
References | () http://secunia.com/advisories/23474 - Broken Link | |
References | () http://secunia.com/advisories/23752 - Broken Link | |
References | () http://secunia.com/advisories/23788 - Broken Link | |
References | () http://secunia.com/advisories/24288 - Broken Link | |
References | () http://secunia.com/advisories/25691 - Broken Link | |
References | () http://securitytracker.com/id?1017526 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm - Third Party Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - Third Party Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm - Third Party Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_79_kernel.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0689.html - Broken Link, Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0710.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0012.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0013.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/471457 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/20363 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-395-1 - Third Party Advisory | |
References | () http://www.us.debian.org/security/2006/dsa-1233 - Broken Link | |
References | () http://www.us.debian.org/security/2006/dsa-1237 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2006/3937 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2006/3999 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 - Broken Link |
10 Feb 2024, 02:45
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.1
v3 : 7.5 |
First Time |
Redhat
Redhat enterprise Linux Canonical ubuntu Linux Canonical |
|
CWE | CWE-416 | |
References | () http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 - Exploit, Issue Tracking | |
References | () http://secunia.com/advisories/22253 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22279 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22292 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/22497 - Broken Link | |
References | () http://secunia.com/advisories/22762 - Broken Link | |
References | () http://secunia.com/advisories/22945 - Broken Link | |
References | () http://secunia.com/advisories/23064 - Broken Link | |
References | () http://secunia.com/advisories/23370 - Broken Link | |
References | () http://secunia.com/advisories/23384 - Broken Link | |
References | () http://secunia.com/advisories/23395 - Broken Link | |
References | () http://secunia.com/advisories/23474 - Broken Link | |
References | () http://secunia.com/advisories/23752 - Broken Link | |
References | () http://secunia.com/advisories/23788 - Broken Link | |
References | () http://secunia.com/advisories/24288 - Broken Link | |
References | () http://secunia.com/advisories/25691 - Broken Link | |
References | () http://securitytracker.com/id?1017526 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm - Third Party Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm - Third Party Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm - Third Party Advisory | |
References | () http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_79_kernel.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0689.html - Broken Link, Patch | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0710.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0012.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2007-0013.html - Broken Link | |
References | () http://www.securityfocus.com/archive/1/471457 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.securityfocus.com/bid/20363 - Broken Link, Third Party Advisory, VDB Entry | |
References | () http://www.ubuntu.com/usn/usn-395-1 - Third Party Advisory | |
References | () http://www.us.debian.org/security/2006/dsa-1233 - Broken Link | |
References | () http://www.us.debian.org/security/2006/dsa-1237 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2006/3937 - Broken Link | |
References | () http://www.vupen.com/english/advisories/2006/3999 - Broken Link | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 - Third Party Advisory, VDB Entry | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 - Broken Link | |
CPE | cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:* |
Information
Published : 2006-10-10 04:06
Updated : 2024-11-21 00:17
NVD link : CVE-2006-4997
Mitre link : CVE-2006-4997
CVE.ORG link : CVE-2006-4997
JSON object : View
Products Affected
linux
- linux_kernel
redhat
- enterprise_linux
canonical
- ubuntu_linux
CWE
CWE-416
Use After Free