CVE-2006-4814

Linux kernel <2.4.33.6 - Info Disclosure

Title source: llm
STIX 2.1

Description

The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock.

Exploits (1)

nomisec STUB
by tagatac · poc
https://github.com/tagatac/linux-CVE-2006-4814

References (31)

Core 31
Core References
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2007:040
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2007:060
Vendor Advisory vendor-advisory x_refsource_trustix
http://www.trustix.org/errata/2007/0002/
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24098
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23609
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9648
Vendor Advisory vendor-advisory x_refsource_redhat
http://rhn.redhat.com/errata/RHSA-2007-0014.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23436
Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/21663
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-416-1
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24100
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30110
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/2222/references
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2006/5082
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33280
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24206
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23997
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/471457
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24482
Vendor Advisory vendor-advisory x_refsource_suse
http://www.novell.com/linux/security/advisories/2007_18_kernel.html
Patch vendor-advisory x_refsource_debian
http://www.debian.org/security/2008/dsa-1503
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29058
Patch vendor-advisory x_refsource_debian
http://www.debian.org/security/2007/dsa-1304
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0211.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/25714
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0787.html
Various Sources mailing-list x_refsource_mlist
http://lists.vmware.com/pipermail/security-announce/2008/000023.html
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/25691
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31246

Scores

EPSS 0.0009
EPSS Percentile 25.4%

Details

CWE
CWE-399
Status published
Products (22)
linux/linux_kernel 2.4.0 (13 CPE variants)
linux/linux_kernel 2.4.1
linux/linux_kernel 2.4.2
linux/linux_kernel 2.4.3
linux/linux_kernel 2.4.4
linux/linux_kernel 2.4.5
linux/linux_kernel 2.4.6
linux/linux_kernel 2.4.7
linux/linux_kernel 2.4.8
linux/linux_kernel 2.4.9
... and 12 more
Published Dec 20, 2006
Tracked Since Feb 18, 2026