Vulnerability Description
The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.16 |
References
- http://marc.info/?l=linux-kernel&m=114476543426600&w=2
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20914
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.securityfocus.com/bid/17640
- http://www.vupen.com/english/advisories/2006/2554
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=188604
- http://marc.info/?l=linux-kernel&m=114476543426600&w=2
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20914
- http://www.debian.org/security/2006/dsa-1103
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.securityfocus.com/bid/17640
- http://www.vupen.com/english/advisories/2006/2554
FAQ
What is CVE-2006-1523?
CVE-2006-1523 is a vulnerability with a CVSS score of 10.0 (HIGH). The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON.
How severe is CVE-2006-1523?
CVE-2006-1523 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1523?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.