Unrated severityNVD Advisory· Published Jul 5, 2006· Updated Apr 16, 2026
CVE-2006-2935
CVE-2006-2935
Description
The dvd_read_bca function in the DVD handling code in drivers/cdrom/cdrom.c in Linux kernel 2.2.16, and later versions, assigns the wrong value to a length variable, which allows local users to execute arbitrary code via a crafted USB Storage device that triggers a buffer overflow.
Affected products
5- cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:5.10:*:*:*:*:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
40- bugzilla.kernel.org/show_bug.cginvdIssue TrackingVendor Advisory
- support.avaya.com/elmodocs2/security/ASA-2006-203.htmnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2006-254.htmnvdThird Party Advisory
- support.avaya.com/elmodocs2/security/ASA-2007-078.htmnvdThird Party Advisory
- www.debian.org/security/2006/dsa-1183nvdThird Party Advisory
- www.debian.org/security/2006/dsa-1184nvdThird Party Advisory
- www.securityfocus.com/archive/1/444887/100/0/threadednvdThird Party AdvisoryVDB Entry
- www.securityfocus.com/bid/18847nvdThird Party AdvisoryVDB Entry
- www.ubuntu.com/usn/usn-331-1nvdThird Party Advisory
- www.ubuntu.com/usn/usn-346-1nvdThird Party Advisory
- bugzilla.redhat.com/bugzilla/show_bug.cginvdIssue TrackingThird Party Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/27579nvdThird Party AdvisoryVDB Entry
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10886nvdThird Party Advisory
- secunia.com/advisories/21179nvdBroken Link
- secunia.com/advisories/21298nvdBroken Link
- secunia.com/advisories/21498nvdBroken Link
- secunia.com/advisories/21605nvdBroken Link
- secunia.com/advisories/21614nvdBroken Link
- secunia.com/advisories/21695nvdBroken Link
- secunia.com/advisories/21934nvdBroken Link
- secunia.com/advisories/22082nvdBroken Link
- secunia.com/advisories/22093nvdBroken Link
- secunia.com/advisories/22174nvdBroken Link
- secunia.com/advisories/22497nvdBroken Link
- secunia.com/advisories/22822nvdBroken Link
- secunia.com/advisories/23064nvdBroken Link
- secunia.com/advisories/23788nvdBroken Link
- secunia.com/advisories/24288nvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.mandriva.com/security/advisoriesnvdBroken Link
- www.novell.com/linux/security/advisories/2006_42_kernel.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2006_47_kernel.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2006_49_kernel.htmlnvdBroken Link
- www.novell.com/linux/security/advisories/2006_64_kernel.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2006-0617.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2006-0710.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2007-0012.htmlnvdBroken Link
- www.redhat.com/support/errata/RHSA-2007-0013.htmlnvdBroken Link
- www.vupen.com/english/advisories/2006/2680nvdBroken Link
- issues.rpath.com/browse/RPL-611nvdBroken Link
News mentions
0No linked articles in our index yet.