CVE-2006-2071
https://notcve.org/view.php?id=CVE-2006-2071
27 Apr 2006 — Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 •
CVE-2006-1864 – Linux Kernel 2.6.x - SMBFS CHRoot Security Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1864
26 Apr 2006 — Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863. • https://www.exploit-db.com/exploits/27766 •
CVE-2006-1863 – Linux Kernel 2.6.x - CIFS CHRoot Security Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1863
25 Apr 2006 — Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864. • https://www.exploit-db.com/exploits/27769 •
CVE-2006-1056
https://notcve.org/view.php?id=CVE-2006-1056
20 Apr 2006 — The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsiste... • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc • CWE-310: Cryptographic Issues •
CVE-2006-1525
https://notcve.org/view.php?id=CVE-2006-1525
19 Apr 2006 — ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.8 • CWE-399: Resource Management Errors •
CVE-2006-1524
https://notcve.org/view.php?id=CVE-2006-1524
19 Apr 2006 — madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-0744
https://notcve.org/view.php?id=CVE-2006-0744
18 Apr 2006 — Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5 • CWE-20: Improper Input Validation •
CVE-2006-0558 – ia64 crash
https://notcve.org/view.php?id=CVE-2006-0558
14 Apr 2006 — perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function. perfmon (perfmon.c) en kernel de Linux en arquitecturas IA64 permiten a usuarios locales provocar una denegación de servicio (caída) mediante la interrupción de una tarea mientras otro proceso está accediendo al mm_struct, lo que desencadena una acción BUG_ON... • http://marc.info/?l=linux-ia64&m=113882384921688 •
CVE-2006-1523
https://notcve.org/view.php?id=CVE-2006-1523
12 Apr 2006 — The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON. La función __group_complete_signal en el manejo de señales RCU (signal.c) en el kernel de Linux 2.6.16 y posiblemente otras versiones, tienen vectores de impacto y ataque desconocidos relacionados con el uso incorrecto de BUG_ON. • http://marc.info/?l=linux-kernel&m=114476543426600&w=2 •
CVE-2006-1522
https://notcve.org/view.php?id=CVE-2006-1522
10 Apr 2006 — The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.3 • CWE-20: Improper Input Validation •