Vulnerability Name:

CVE-2006-2629 (CCN-26746)

Assigned:2006-05-26
Published:2006-05-26
Updated:2017-07-20
Summary:Race condition in Linux kernel 2.6.15 to 2.6.17, when running on SMP platforms, allows local users to cause a denial of service (crash) by creating and exiting a large number of tasks, then accessing the /proc entry of a task that is exiting, which causes memory corruption that leads to a failure in the prune_dcache function or a BUG_ON error in include/linux/list.h.
CVSS v3 Severity:5.1 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:4.0 Medium (CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
4.0 Medium (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2006-2629

Source: MLIST
Type: UNKNOWN
[linux-kernel] 20060526 PROBLEM: /proc (procfs) task exit race condition causes a kernelcrash

Source: CCN
Type: linux-kernel Mailing List, 2006-05-26 0:43:33
PROBLEM: /proc (procfs) task exit race condition causes a kernel

Source: CCN
Type: SA20349
Linux Kernel SMP "/proc" Race Condition Denial of Service

Source: SECUNIA
Type: UNKNOWN
20349

Source: CCN
Type: The Linux Kernel Archives Web site
The Linux Kernel Archives

Source: OSVDB
Type: UNKNOWN
25847

Source: CCN
Type: OSVDB ID: 25847
Linux Kernel SMP /proc Race Condition Local DoS

Source: BID
Type: UNKNOWN
18183

Source: CCN
Type: BID-18183
Linux Kernel Proc dentry_unused Corruption Local Denial of Service Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-2070

Source: XF
Type: UNKNOWN
linux-task-race-condition-dos(26746)

Source: XF
Type: UNKNOWN
linux-task-race-condition-dos(26746)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:-:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
  • OR cpe:/o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    linux linux kernel 2.6.15
    linux linux kernel 2.6.15.1
    linux linux kernel 2.6.15.2
    linux linux kernel 2.6.15.3
    linux linux kernel 2.6.15.4
    linux linux kernel 2.6.15.5
    linux linux kernel 2.6.15.6
    linux linux kernel 2.6.16
    linux linux kernel 2.6.16 rc1
    linux linux kernel 2.6.16 rc2
    linux linux kernel 2.6.16 rc3
    linux linux kernel 2.6.16 rc4
    linux linux kernel 2.6.16 rc5
    linux linux kernel 2.6.16 rc6
    linux linux kernel 2.6.16.1
    linux linux kernel 2.6.16.2
    linux linux kernel 2.6.16.3
    linux linux kernel 2.6.16.4
    linux linux kernel 2.6.16.5
    linux linux kernel 2.6.16.6
    linux linux kernel 2.6.16.7
    linux linux kernel 2.6.16.8
    linux linux kernel 2.6.16.9
    linux linux kernel 2.6.16.10
    linux linux kernel 2.6.16.11
    linux linux kernel 2.6.16.12
    linux linux kernel 2.6.16.13
    linux linux kernel 2.6.16.14
    linux linux kernel 2.6.16.15
    linux linux kernel 2.6.16.16
    linux linux kernel 2.6.16.17
    linux linux kernel 2.6.16.18
    linux linux kernel 2.6.17
    linux linux kernel 2.6.17 rc1
    linux linux kernel 2.6.17 rc2
    linux linux kernel 2.6.17 rc3
    linux linux kernel 2.6.17 rc4
    linux linux kernel 2.6.17 rc5
    linux linux kernel 2.6.15.1
    linux linux kernel 2.6.16.1
    linux linux kernel 2.6.17 rc1
    linux linux kernel 2.6.16
    linux linux kernel 2.6.16.11
    linux linux kernel 2.6.15
    linux linux kernel 2.6.17
    linux linux kernel 2.6.17 rc5
    linux linux kernel 2.6.17 rc4
    linux linux kernel 2.6.17 rc3
    linux linux kernel 2.6.17 rc2
    linux linux kernel 2.6.16 rc6
    linux linux kernel 2.6.16 rc5
    linux linux kernel 2.6.16 rc4
    linux linux kernel 2.6.16 rc3
    linux linux kernel 2.6.16 rc2
    linux linux kernel 2.6.16 rc1
    linux linux kernel 2.6.16.9
    linux linux kernel 2.6.16.8
    linux linux kernel 2.6.16.7
    linux linux kernel 2.6.16.6
    linux linux kernel 2.6.16.5
    linux linux kernel 2.6.16.4
    linux linux kernel 2.6.16.3
    linux linux kernel 2.6.16.2
    linux linux kernel 2.6.16.18
    linux linux kernel 2.6.16.17
    linux linux kernel 2.6.16.16
    linux linux kernel 2.6.16.15
    linux linux kernel 2.6.16.14
    linux linux kernel 2.6.16.13
    linux linux kernel 2.6.16.12
    linux linux kernel 2.6.16.10
    linux linux kernel 2.6.15.6
    linux linux kernel 2.6.15.5
    linux linux kernel 2.6.15.4
    linux linux kernel 2.6.15.3
    linux linux kernel 2.6.15.2