U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2006-4997

Change History

Modified Analysis by NIST 2/09/2024 9:45:17 PM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
     *cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:o:redhat:enterprise_linux:2.1:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:3:*:*:*:*:*:*:*
     *cpe:2.3:o:redhat:enterprise_linux:4:*:*:*:*:*:*:*
Changed CPE Configuration
OR
     *cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:386:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:686_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_k8_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:amd64_xeon:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:k7_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power3_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:power4_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:powerpc_smp:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:*:x86_64:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*
     *cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*
OR
     *cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* versions up to (excluding) 2.6.18
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Added CWE

								
							
							
						
NIST CWE-416
Removed CWE
NIST NVD-CWE-noinfo

								
						
Changed Reference Type
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 No Types Assigned
http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 Exploit, Issue Tracking
Changed Reference Type
http://secunia.com/advisories/22253 Vendor Advisory
http://secunia.com/advisories/22253 Broken Link, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/22279 Patch, Vendor Advisory
http://secunia.com/advisories/22279 Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/22292 Patch, Vendor Advisory
http://secunia.com/advisories/22292 Broken Link, Patch, Vendor Advisory
Changed Reference Type
http://secunia.com/advisories/22497 No Types Assigned
http://secunia.com/advisories/22497 Broken Link
Changed Reference Type
http://secunia.com/advisories/22762 No Types Assigned
http://secunia.com/advisories/22762 Broken Link
Changed Reference Type
http://secunia.com/advisories/22945 No Types Assigned
http://secunia.com/advisories/22945 Broken Link
Changed Reference Type
http://secunia.com/advisories/23064 No Types Assigned
http://secunia.com/advisories/23064 Broken Link
Changed Reference Type
http://secunia.com/advisories/23370 No Types Assigned
http://secunia.com/advisories/23370 Broken Link
Changed Reference Type
http://secunia.com/advisories/23384 No Types Assigned
http://secunia.com/advisories/23384 Broken Link
Changed Reference Type
http://secunia.com/advisories/23395 No Types Assigned
http://secunia.com/advisories/23395 Broken Link
Changed Reference Type
http://secunia.com/advisories/23474 No Types Assigned
http://secunia.com/advisories/23474 Broken Link
Changed Reference Type
http://secunia.com/advisories/23752 No Types Assigned
http://secunia.com/advisories/23752 Broken Link
Changed Reference Type
http://secunia.com/advisories/23788 No Types Assigned
http://secunia.com/advisories/23788 Broken Link
Changed Reference Type
http://secunia.com/advisories/24288 No Types Assigned
http://secunia.com/advisories/24288 Broken Link
Changed Reference Type
http://secunia.com/advisories/25691 No Types Assigned
http://secunia.com/advisories/25691 Broken Link
Changed Reference Type
http://securitytracker.com/id?1017526 No Types Assigned
http://securitytracker.com/id?1017526 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm No Types Assigned
http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm Third Party Advisory
Changed Reference Type
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm No Types Assigned
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm Third Party Advisory
Changed Reference Type
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm No Types Assigned
http://support.avaya.com/elmodocs2/security/ASA-2007-078.htm Third Party Advisory
Changed Reference Type
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 No Types Assigned
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fe26109a9dfd9327fdbe630fc819e1b7450986b2 Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2006:197 Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2007:012 Broken Link
Changed Reference Type
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 No Types Assigned
http://www.mandriva.com/security/advisories?name=MDKSA-2007:025 Broken Link
Changed Reference Type
http://www.novell.com/linux/security/advisories/2006_79_kernel.html No Types Assigned
http://www.novell.com/linux/security/advisories/2006_79_kernel.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2006-0689.html Patch
http://www.redhat.com/support/errata/RHSA-2006-0689.html Broken Link, Patch
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2006-0710.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2006-0710.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2007-0012.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2007-0012.html Broken Link
Changed Reference Type
http://www.redhat.com/support/errata/RHSA-2007-0013.html No Types Assigned
http://www.redhat.com/support/errata/RHSA-2007-0013.html Broken Link
Changed Reference Type
http://www.securityfocus.com/archive/1/471457 No Types Assigned
http://www.securityfocus.com/archive/1/471457 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.securityfocus.com/bid/20363 No Types Assigned
http://www.securityfocus.com/bid/20363 Broken Link, Third Party Advisory, VDB Entry
Changed Reference Type
http://www.ubuntu.com/usn/usn-395-1 No Types Assigned
http://www.ubuntu.com/usn/usn-395-1 Third Party Advisory
Changed Reference Type
http://www.us.debian.org/security/2006/dsa-1233 No Types Assigned
http://www.us.debian.org/security/2006/dsa-1233 Broken Link
Changed Reference Type
http://www.us.debian.org/security/2006/dsa-1237 No Types Assigned
http://www.us.debian.org/security/2006/dsa-1237 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2006/3937 No Types Assigned
http://www.vupen.com/english/advisories/2006/3937 Broken Link
Changed Reference Type
http://www.vupen.com/english/advisories/2006/3999 No Types Assigned
http://www.vupen.com/english/advisories/2006/3999 Broken Link
Changed Reference Type
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 No Types Assigned
https://exchange.xforce.ibmcloud.com/vulnerabilities/29387 Third Party Advisory, VDB Entry
Changed Reference Type
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 No Types Assigned
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10388 Broken Link