{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2006-12-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2007-01-10T10:00:00.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"2007-0002","tags":["vendor-advisory","x_refsource_TRUSTIX"],"url":"http://www.trustix.org/errata/2007/0002/"},{"name":"24098","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24098"},{"name":"MDKSA-2007:025","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:025"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff%3Bh=05dca9b77f99d80cf615075624666106d5b61727"},{"name":"23609","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23609"},{"name":"MDKSA-2007:012","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:012"},{"name":"SUSE-SA:2007:021","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_21_kernel.html"},{"name":"MDKSA-2007:040","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040"},{"name":"USN-416-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-416-1"},{"name":"24100","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24100"},{"name":"25226","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25226"},{"name":"23752","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23752"},{"name":"25683","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25683"},{"name":"20070615 rPSA-2007-0124-1 kernel xen","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/471457"},{"name":"21883","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21883"},{"name":"SUSE-SA:2007:018","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html"},{"name":"23529","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/23529"},{"name":"21835","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/21835"},{"name":"24547","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/24547"},{"name":"SUSE-SA:2007:030","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_30_kernel.html"},{"name":"SUSE-SA:2007:035","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.novell.com/linux/security/advisories/2007_35_kernel.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34"},{"name":"25691","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/25691"}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-07T20:04:54.659Z"},"title":"CVE Program Container","references":[{"name":"2007-0002","tags":["vendor-advisory","x_refsource_TRUSTIX","x_transferred"],"url":"http://www.trustix.org/errata/2007/0002/"},{"name":"24098","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24098"},{"name":"MDKSA-2007:025","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:025"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.kernel.org/git/?p=linux/kernel/git/wtarreau/linux-2.4.git%3Ba=commitdiff%3Bh=05dca9b77f99d80cf615075624666106d5b61727"},{"name":"23609","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23609"},{"name":"MDKSA-2007:012","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:012"},{"name":"SUSE-SA:2007:021","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_21_kernel.html"},{"name":"MDKSA-2007:040","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2007:040"},{"name":"USN-416-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-416-1"},{"name":"24100","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24100"},{"name":"25226","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25226"},{"name":"23752","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23752"},{"name":"25683","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25683"},{"name":"20070615 rPSA-2007-0124-1 kernel xen","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/471457"},{"name":"21883","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21883"},{"name":"SUSE-SA:2007:018","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_18_kernel.html"},{"name":"23529","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/23529"},{"name":"21835","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/21835"},{"name":"24547","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/24547"},{"name":"SUSE-SA:2007:030","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_30_kernel.html"},{"name":"SUSE-SA:2007:035","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.novell.com/linux/security/advisories/2007_35_kernel.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34"},{"name":"25691","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/25691"}]}]},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2006-5749","datePublished":"2007-01-04T02:00:00.000Z","dateReserved":"2006-11-06T00:00:00.000Z","dateUpdated":"2024-08-07T20:04:54.659Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}