Integer overflow in the get_fdb_entries function in net/bridge/br_ioctl.c in the Linux kernel before 2.6.18.4 allows local users to execute arbitrary code via a large maxnum value in an ioctl request.
References
Link Providers
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.18.4 cve-icon cve-icon
http://projects.info-pull.com/mokb/MOKB-29-11-2006.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2007-0014.html cve-icon cve-icon
http://secunia.com/advisories/23073 cve-icon cve-icon
http://secunia.com/advisories/23252 cve-icon cve-icon
http://secunia.com/advisories/23370 cve-icon cve-icon
http://secunia.com/advisories/23384 cve-icon cve-icon
http://secunia.com/advisories/23474 cve-icon cve-icon
http://secunia.com/advisories/23593 cve-icon cve-icon
http://secunia.com/advisories/23752 cve-icon cve-icon
http://secunia.com/advisories/23997 cve-icon cve-icon
http://secunia.com/advisories/24206 cve-icon cve-icon
http://secunia.com/advisories/24547 cve-icon cve-icon
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm cve-icon cve-icon
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=blobdiff%3Bh=4c61a7e0a86e1ae9e16867f9f8e4b0412b8edbaf%3Bhp=4e4119a1213925568b8a1acdef9bf52b98b19da3%3Bhb=ba8379b220509e9448c00a77cf6c15ac2a559cc7%3Bf=net/bridge/br_ioctl.c cve-icon cve-icon
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ba8379b220509e9448c00a77cf6c15ac2a559cc7 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:002 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2006_79_kernel.html cve-icon cve-icon
http://www.novell.com/linux/security/advisories/2007_21_kernel.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/453681/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/21353 cve-icon cve-icon
http://www.ubuntu.com/usn/usn-395-1 cve-icon cve-icon
http://www.us.debian.org/security/2006/dsa-1233 cve-icon cve-icon
http://www.vupen.com/english/advisories/2006/4781 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/30588 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-803 cve-icon cve-icon
https://issues.rpath.com/browse/RPL-837 cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2006-5751 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10151 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2006-5751 cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2006-12-02T02:00:00

Updated: 2024-08-07T20:04:54.599Z

Reserved: 2006-11-06T00:00:00

Link: CVE-2006-5751

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2006-12-02T02:28:00.000

Modified: 2023-11-07T01:59:39.903

Link: CVE-2006-5751

cve-icon Redhat

Severity : Important

Publid Date: 2006-11-29T00:00:00Z

Links: CVE-2006-5751 - Bugzilla