Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1097-1 | New Kernel 2.4.27 packages fix several vulnerabilities |
Debian DSA |
DSA-1103-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2006-0046 | Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function. |
Ubuntu USN |
USN-302-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T16:18:20.799Z
Reserved: 2005-12-20T00:00:00
Link: CVE-2006-0038
No data.
Status : Deferred
Published: 2006-03-22T20:06:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2006-0038
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN