The procfs implementation in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was mounted with mount_procfs -o linux, which results in a NULL pointer dereference.
References
Link | Resource |
---|---|
ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc | |
http://securitytracker.com/id?1017293 | Patch Vendor Advisory |
ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc | |
http://securitytracker.com/id?1017293 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:23
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2006-026.txt.asc - | |
References | () http://securitytracker.com/id?1017293 - Patch, Vendor Advisory |
Information
Published : 2006-12-20 02:28
Updated : 2024-11-21 00:23
NVD link : CVE-2006-6655
Mitre link : CVE-2006-6655
CVE.ORG link : CVE-2006-6655
JSON object : View
Products Affected
netbsd
- netbsd
CWE