CVE
- Id
- 19730
- CVE No.
- CVE-2006-3626
- Status
- Candidate
- Description
- Race condition in Linux kernel 2.6.17.4 and earlier allows local users to gain root privileges by using prctl with PR_SET_DUMPABLE in a way that causes /proc/self/environ to become setuid root.
- Phase
- Assigned (20060714)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
178726 | 19730 | CVE-2006-3626 | BUGTRAQ:20060717 rPSA-2006-0130-1 kernel | View |
178727 | 19730 | CVE-2006-3626 | URL:http://www.securityfocus.com/archive/1/archive/1/440300/100/0/threaded | View |
178728 | 19730 | CVE-2006-3626 | FULLDISC:20060714 Linux kernel 0day - dynamite inside, don"t burn your fingers | View |
178729 | 19730 | CVE-2006-3626 | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047907.html | View |
178730 | 19730 | CVE-2006-3626 | CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.5 | View |
178731 | 19730 | CVE-2006-3626 | CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=198973 | View |
178732 | 19730 | CVE-2006-3626 | CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=blobdiff;h=0cb8f20d000c25118947fcafa81606300ced35f8;hp=243a94af0427b2630fb85f489a5419410dac3bfc;hb=18b0bbd8ca6d3cb90425aa0d77b99a762c6d6de3;f=fs/proc/base.c | View |
178733 | 19730 | CVE-2006-3626 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-203.htm | View |
178734 | 19730 | CVE-2006-3626 | DEBIAN:DSA-1111 | View |
178735 | 19730 | CVE-2006-3626 | URL:http://www.debian.org/security/2006/dsa-1111 | View |
178736 | 19730 | CVE-2006-3626 | MANDRIVA:MDKSA-2006:124 | View |
178737 | 19730 | CVE-2006-3626 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:124 | View |
178738 | 19730 | CVE-2006-3626 | REDHAT:RHSA-2006:0617 | View |
178739 | 19730 | CVE-2006-3626 | URL:http://www.redhat.com/support/errata/RHSA-2006-0617.html | View |
178740 | 19730 | CVE-2006-3626 | SUSE:SUSE-SR:2006:017 | View |
178741 | 19730 | CVE-2006-3626 | URL:http://www.novell.com/linux/security/advisories/2006_17_sr.html | View |
178742 | 19730 | CVE-2006-3626 | SUSE:SUSE-SA:2006:042 | View |
178743 | 19730 | CVE-2006-3626 | URL:http://www.novell.com/linux/security/advisories/2006_42_kernel.html | View |
178744 | 19730 | CVE-2006-3626 | SUSE:SUSE-SA:2006:047 | View |
178745 | 19730 | CVE-2006-3626 | URL:http://www.novell.com/linux/security/advisories/2006_47_kernel.html | View |
178746 | 19730 | CVE-2006-3626 | SUSE:SUSE-SA:2006:049 | View |
178747 | 19730 | CVE-2006-3626 | URL:http://www.novell.com/linux/security/advisories/2006_49_kernel.html | View |
178748 | 19730 | CVE-2006-3626 | UBUNTU:USN-319-1 | View |
178749 | 19730 | CVE-2006-3626 | URL:http://www.ubuntulinux.org/support/documentation/usn/usn-319-1 | View |
178750 | 19730 | CVE-2006-3626 | UBUNTU:USN-319-2 | View |
178751 | 19730 | CVE-2006-3626 | URL:http://www.ubuntu.com/usn/usn-319-2 | View |
178752 | 19730 | CVE-2006-3626 | BID:18992 | View |
178753 | 19730 | CVE-2006-3626 | URL:http://www.securityfocus.com/bid/18992 | View |
178754 | 19730 | CVE-2006-3626 | OVAL:oval:org.mitre.oval:def:10060 | View |
178755 | 19730 | CVE-2006-3626 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10060 | View |
178756 | 19730 | CVE-2006-3626 | VUPEN:ADV-2006-2816 | View |
178757 | 19730 | CVE-2006-3626 | URL:http://www.vupen.com/english/advisories/2006/2816 | View |
178758 | 19730 | CVE-2006-3626 | OSVDB:27120 | View |
178759 | 19730 | CVE-2006-3626 | URL:http://www.osvdb.org/27120 | View |
178760 | 19730 | CVE-2006-3626 | SECUNIA:21041 | View |
178761 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21041 | View |
178762 | 19730 | CVE-2006-3626 | SECUNIA:21073 | View |
178763 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21073 | View |
178764 | 19730 | CVE-2006-3626 | SECUNIA:21119 | View |
178765 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21119 | View |
178766 | 19730 | CVE-2006-3626 | SECUNIA:21123 | View |
178767 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21123 | View |
178768 | 19730 | CVE-2006-3626 | SECUNIA:21179 | View |
178769 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21179 | View |
178770 | 19730 | CVE-2006-3626 | SECUNIA:21057 | View |
178771 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21057 | View |
178772 | 19730 | CVE-2006-3626 | SECUNIA:21605 | View |
178773 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21605 | View |
178774 | 19730 | CVE-2006-3626 | SECUNIA:22174 | View |
178775 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/22174 | View |
178776 | 19730 | CVE-2006-3626 | SECUNIA:21498 | View |
178777 | 19730 | CVE-2006-3626 | URL:http://secunia.com/advisories/21498 | View |
178778 | 19730 | CVE-2006-3626 | XF:linux-proc-race-condition(27790) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
58207 | JVNDB-2006-000403 | Wireshark の複数の解析部におけるフォーマットストリングの脆弱性 | ------------ | CVE-2006-3628 | 19730 | 7.5 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000403.html | View |