CVE-2006-4997

7.5 HIGH
Published: October 10, 2006 Modified: April 23, 2026
View on NVD

Description

The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference).

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265
Source: cve@mitre.org
Exploit Issue Tracking
http://secunia.com/advisories/22253
Source: cve@mitre.org
Broken Link Vendor Advisory
http://secunia.com/advisories/22279
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22292
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22497
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/22762
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/22945
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23064
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23370
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23384
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23395
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23474
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23752
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/23788
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/24288
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/25691
Source: cve@mitre.org
Broken Link
http://securitytracker.com/id?1017526
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
Source: cve@mitre.org
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
Source: cve@mitre.org
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm
Source: cve@mitre.org
Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2006-0689.html
Source: cve@mitre.org
Broken Link Patch
http://www.securityfocus.com/archive/1/471457
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20363
Source: cve@mitre.org
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-395-1
Source: cve@mitre.org
Third Party Advisory
http://www.us.debian.org/security/2006/dsa-1233
Source: cve@mitre.org
Broken Link
http://www.us.debian.org/security/2006/dsa-1237
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2006/3937
Source: cve@mitre.org
Broken Link
http://www.vupen.com/english/advisories/2006/3999
Source: cve@mitre.org
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Issue Tracking
http://secunia.com/advisories/22253
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Vendor Advisory
http://secunia.com/advisories/22279
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22292
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://secunia.com/advisories/22497
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/22762
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/22945
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23064
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23370
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23384
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23395
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23474
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23752
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/23788
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/24288
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25691
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://securitytracker.com/id?1017526
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2006-0689.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch
http://www.redhat.com/support/errata/RHSA-2006-0710.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2007-0013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/archive/1/471457
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/20363
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Third Party Advisory VDB Entry
http://www.ubuntu.com/usn/usn-395-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.us.debian.org/security/2006/dsa-1233
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.us.debian.org/security/2006/dsa-1237
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2006/3937
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.vupen.com/english/advisories/2006/3999
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry

76 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.5 / 10.0
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

redhat linux canonical