First published: Wed Dec 20 2006(Updated: )
The procfs implementation in NetBSD-current before 20061023, NetBSD 3.0 and 3.0.1 before 20061024, and NetBSD 2.x before 20061029 allows local users to cause a denial of service (kernel panic) by attempting to access /emul/linux/proc/0/stat on a procfs filesystem that was mounted with mount_procfs -o linux, which results in a NULL pointer dereference.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetBSD current | =2.1 | |
NetBSD current | =3.0.1 | |
NetBSD current | =3.0 | |
NetBSD current | =2.0 | |
=2.0 | ||
=2.1 | ||
=3.0 | ||
=3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6655 is a medium severity vulnerability that can lead to a denial of service through kernel panic.
Fix CVE-2006-6655 by upgrading to the latest version of NetBSD that incorporates the patch released after October 2006.
CVE-2006-6655 affects local users of NetBSD versions 2.0, 2.1, 3.0, and 3.0.1 prior to specified patch dates.
CVE-2006-6655 is caused by improper handling of the procfs implementation when accessing specific proc files.
Yes, CVE-2006-6655 specifically affects the NetBSD operating system in the specified versions and configurations.