4
CVSSv2

CVE-2006-2445

Published: 23/06/2006 Updated: 07/11/2023
CVSS v2 Base Score: 4 | Impact Score: 6.9 | Exploitability Score: 1.9
VMScore: 356
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:C

Vulnerability Summary

Race condition in run_posix_cpu_timers in Linux kernel prior to 2.6.16.21 allows local users to cause a denial of service (BUG_ON crash) by causing one CPU to attach a timer to a process that is exiting.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11

linux linux kernel 2.6.4

linux linux kernel 2.6.16.16

linux linux kernel 2.6.16.9

linux linux kernel 2.6.12

linux linux kernel 2.6.14

linux linux kernel 2.6.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.10

linux linux kernel 2.6.13

linux linux kernel 2.6.1

linux linux kernel 2.6.16.6

linux linux kernel 2.6.16.8

linux linux kernel 2.6.16

linux linux kernel 2.6.7

linux linux kernel 2.6.3

linux linux kernel 2.6.15

linux linux kernel 2.6.13.3

linux linux kernel 2.6.11.8

linux linux kernel 2.6.14.4

linux linux kernel 2.6.16.18

linux linux kernel 2.6.14.3

linux linux kernel 2.6.11.6

linux linux kernel 2.6.11.11

linux linux kernel 2.6.0

linux linux kernel 2.6.16.13

linux linux kernel 2.6.9

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16.15

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.15.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.16.1

linux linux kernel 2.6.8

linux linux kernel 2.6.2

linux linux kernel 2.6.6

linux linux kernel 2.6.14.5

linux linux kernel 2.6.13.2

linux linux kernel 2.6.16.11

linux linux kernel 2.6.16.14

linux linux kernel 2.6.14.1

linux linux kernel 2.6.12.5

linux linux kernel 2.6.16.3

linux linux kernel 2.6.12.1

linux linux kernel 2.6.13.4

linux linux kernel 2.6.12.2

linux linux kernel 2.6.15.2

linux linux kernel 2.6.16.10

linux linux kernel 2.6.12.4

linux linux kernel 2.6.12.3

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.17

linux linux kernel 2.6.16.12

linux linux kernel 2.6.12.6

linux linux kernel 2.6.11.7

linux linux kernel 2.6.16.2

linux linux kernel 2.6.14.2

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.5

linux linux kernel 2.6.16.19

linux linux kernel 2.6.11.12

linux linux kernel 2.6.16.20

linux linux kernel 2.6.15.5

linux linux kernel 2.6.13.1

Vendor Advisories

A race condition was discovered in the do_add_counters() functions Processes which do not run with full root privileges, but have the CAP_NET_ADMIN capability can exploit this to crash the machine or read a random piece of kernel memory In Ubuntu there are no packages that are affected by this, so this can only be an issue for you if you use thi ...