First published: Tue Nov 21 2006(Updated: )
The NetBSD-current kernel before 20061028 does not properly perform bounds checking of an unspecified userspace parameter in the ptrace system call during a PT_DUMPCORE request, which allows local users to have an unknown impact.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD NetBSD | =current |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6014 has a severity rating that suggests it poses a risk to local users of the NetBSD-current kernel.
To fix CVE-2006-6014, update your NetBSD-current kernel to a version released after October 28, 2006.
Local users of the NetBSD-current kernel prior to the specified patch date are affected by CVE-2006-6014.
CVE-2006-6014 exploits improper bounds checking in the ptrace system call during a PT_DUMPCORE request.
No, CVE-2006-6014 is not a remote vulnerability; it can only be exploited by local users.