First published: Fri May 19 2006(Updated: )
Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0039 is considered to be of medium severity due to its potential for local privilege escalation.
The best way to fix CVE-2006-0039 is to upgrade to a Linux kernel version later than 2.6.16.17 where this vulnerability has been addressed.
CVE-2006-0039 specifically affects Linux Kernel version 2.6.16.
CVE-2006-0039 can be exploited by local users who possess CAP_NET_ADMIN capabilities.
CVE-2006-0039 is a race condition vulnerability that can lead to kernel memory exposure.