Executive Summary

Informations
Name CVE-2006-0558 First vendor Publication 2006-04-14
Vendor Cve Last vendor Modification 2024-11-21

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 4.9 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0558

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10177
 
Oval ID: oval:org.mitre.oval:def:10177
Title: perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function.
Description: perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function.
Family: unix Class: vulnerability
Reference(s): CVE-2006-0558
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 80

OpenVAS Exploits

Date Description
2008-01-17 Name : Debian Security Advisory DSA 1103-1 (kernel-source-2.6.8)
File : nvt/deb_1103_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
24808 Linux Kernel on IA64 perfmon Task Corruption Local DoS

Nessus® Vulnerability Scanner

Date Description
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2007-0774.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20070904_kernel_on_SL4_x.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20070904_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2007-09-07 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2007-0774.nasl - Type : ACT_GATHER_INFO
2007-09-05 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2007-0774.nasl - Type : ACT_GATHER_INFO
2006-10-14 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1103.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

http://marc.info/?l=linux-ia64&m=113882384921688
http://secunia.com/advisories/19737
http://secunia.com/advisories/20914
http://secunia.com/advisories/26709
http://www.debian.org/security/2006/dsa-1103
http://www.redhat.com/support/errata/RHSA-2007-0774.html
http://www.securityfocus.com/bid/17482
http://www.vupen.com/english/advisories/2006/1444
http://www.vupen.com/english/advisories/2006/2554
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=185082
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
Source Url

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
Date Informations
2024-11-28 23:20:42
  • Multiple Updates
2024-11-28 12:08:18
  • Multiple Updates
2024-08-02 12:04:05
  • Multiple Updates
2024-08-02 01:01:51
  • Multiple Updates
2024-02-02 01:03:48
  • Multiple Updates
2024-02-01 12:01:51
  • Multiple Updates
2023-11-07 21:48:04
  • Multiple Updates
2023-09-05 12:03:34
  • Multiple Updates
2023-09-05 01:01:42
  • Multiple Updates
2023-09-02 12:03:38
  • Multiple Updates
2023-09-02 01:01:42
  • Multiple Updates
2023-08-12 12:04:13
  • Multiple Updates
2023-08-12 01:01:43
  • Multiple Updates
2023-08-11 12:03:42
  • Multiple Updates
2023-08-11 01:01:45
  • Multiple Updates
2023-08-06 12:03:28
  • Multiple Updates
2023-08-06 01:01:43
  • Multiple Updates
2023-08-04 12:03:33
  • Multiple Updates
2023-08-04 01:01:45
  • Multiple Updates
2023-07-14 12:03:32
  • Multiple Updates
2023-07-14 01:01:44
  • Multiple Updates
2023-03-29 01:03:44
  • Multiple Updates
2023-03-28 12:01:49
  • Multiple Updates
2022-10-11 12:03:09
  • Multiple Updates
2022-10-11 01:01:36
  • Multiple Updates
2021-05-04 12:03:41
  • Multiple Updates
2021-04-22 01:04:12
  • Multiple Updates
2020-05-23 00:17:23
  • Multiple Updates
2017-10-11 09:23:37
  • Multiple Updates
2016-10-18 12:01:55
  • Multiple Updates
2016-04-26 14:16:44
  • Multiple Updates
2014-02-17 10:34:36
  • Multiple Updates
2013-05-11 10:48:51
  • Multiple Updates