CVE-2006-1055
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
05/04/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read.
Impacto
Puntuación base 2.0
4.90
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:* | ||
cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19495
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20716
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp%3D597a7679dd83691be2f3a53e1f3f915b4a7f6eba
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24443
- http://www.securityfocus.com/bid/17402
- http://www.trustix.org/errata/2006/0020
- http://www.ubuntu.com/usn/usn-302-1
- http://www.vupen.com/english/advisories/2006/1273
- http://www.vupen.com/english/advisories/2006/1475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
- https://usn.ubuntu.com/281-1/
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19495
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20716
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommit%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba%3Dcommitdiff%3Bh%3D6e0dd741a89be35defa05bd79f4211c5a2762825%3Bhp%3D597a7679dd83691be2f3a53e1f3f915b4a7f6eba
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24443
- http://www.securityfocus.com/bid/17402
- http://www.trustix.org/errata/2006/0020
- http://www.ubuntu.com/usn/usn-302-1
- http://www.vupen.com/english/advisories/2006/1273
- http://www.vupen.com/english/advisories/2006/1475
- https://exchange.xforce.ibmcloud.com/vulnerabilities/25693
- https://usn.ubuntu.com/281-1/