First published: Tue Jan 31 2006(Updated: )
Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0 | |
Linux Kernel | =2.6.0-test1 | |
Linux Kernel | =2.6.0-test10 | |
Linux Kernel | =2.6.0-test11 | |
Linux Kernel | =2.6.0-test2 | |
Linux Kernel | =2.6.0-test3 | |
Linux Kernel | =2.6.0-test4 | |
Linux Kernel | =2.6.0-test5 | |
Linux Kernel | =2.6.0-test6 | |
Linux Kernel | =2.6.0-test7 | |
Linux Kernel | =2.6.0-test8 | |
Linux Kernel | =2.6.0-test9 | |
Linux Kernel | =2.6.1 | |
Linux Kernel | =2.6.1-rc1 | |
Linux Kernel | =2.6.1-rc2 | |
Linux Kernel | =2.6.2 | |
Linux Kernel | =2.6.3 | |
Linux Kernel | =2.6.4 | |
Linux Kernel | =2.6.5 | |
Linux Kernel | =2.6.6 | |
Linux Kernel | =2.6.6-rc1 | |
Linux Kernel | =2.6.7 | |
Linux Kernel | =2.6.7-rc1 | |
Linux Kernel | =2.6.8 | |
Linux Kernel | =2.6.8-rc1 | |
Linux Kernel | =2.6.8-rc2 | |
Linux Kernel | =2.6.8-rc3 | |
Linux Kernel | =2.6.8.1 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.8.1.5 | |
Linux Kernel | =2.6.9-2.6.20 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.10-rc2 | |
Linux Kernel | =2.6.11 | |
Linux Kernel | =2.6.11-rc1 | |
Linux Kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.11-rc3 | |
Linux Kernel | =2.6.11-rc4 | |
Linux Kernel | =2.6.11.1 | |
Linux Kernel | =2.6.11.2 | |
Linux Kernel | =2.6.11.3 | |
Linux Kernel | =2.6.11.4 | |
Linux Kernel | =2.6.11.5 | |
Linux Kernel | =2.6.11.6 | |
Linux Kernel | =2.6.11.7 | |
Linux Kernel | =2.6.11.8 | |
Linux Kernel | =2.6.11.9 | |
Linux Kernel | =2.6.11.10 | |
Linux Kernel | =2.6.11.11 | |
Linux Kernel | =2.6.11.12 | |
Linux Kernel | =2.6.11_rc1_bk6 | |
Linux Kernel | =2.6.12 | |
Linux Kernel | =2.6.12-rc1 | |
Linux Kernel | =2.6.12-rc4 | |
Linux Kernel | =2.6.12-rc5 | |
Linux Kernel | =2.6.12.1 | |
Linux Kernel | =2.6.12.2 | |
Linux Kernel | =2.6.12.3 | |
Linux Kernel | =2.6.12.4 | |
Linux Kernel | =2.6.12.5 | |
Linux Kernel | =2.6.12.6 | |
Linux Kernel | =2.6.13 | |
Linux Kernel | =2.6.13-rc1 | |
Linux Kernel | =2.6.13-rc4 | |
Linux Kernel | =2.6.13-rc6 | |
Linux Kernel | =2.6.13-rc7 | |
Linux Kernel | =2.6.13.1 | |
Linux Kernel | =2.6.13.2 | |
Linux Kernel | =2.6.13.3 | |
Linux Kernel | =2.6.13.4 | |
Linux Kernel | =2.6.14 | |
Linux Kernel | =2.6.14-rc1 | |
Linux Kernel | =2.6.14-rc2 | |
Linux Kernel | =2.6.14-rc3 | |
Linux Kernel | =2.6.14-rc4 | |
Linux Kernel | =2.6.14.1 | |
Linux Kernel | =2.6.14.2 | |
Linux Kernel | =2.6.14.3 | |
Linux Kernel | =2.6.14.4 | |
Linux Kernel | =2.6.15 | |
Linux Kernel | =2.6.15-rc1 | |
Linux Kernel | =2.6.15-rc3 | |
Linux Kernel | =2.6.15-rc4 | |
Linux Kernel | =2.6.15-rc5 | |
Linux Kernel | =2.6.15-rc6 | |
Linux Kernel | =2.6.15-rc7 | |
Linux Kernel | =2.6_test9_cvs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0482 has a severity rating of medium due to its potential to cause a denial of service.
CVE-2006-0482 affects Linux kernel versions 2.6.15.1 and earlier running on SPARC architectures.
The impact of CVE-2006-0482 is a denial of service that results in the system hanging when the 'date -s' command is executed.
To fix CVE-2006-0482, upgrade the Linux kernel to a version later than 2.6.15.1.
No, CVE-2006-0482 requires local access to the system to be exploited.