Page 310 of 3415 results (0.024 seconds)

CVSS: 7.1EPSS: 0%CPEs: 157EXPL: 0

27 Apr 2006 — Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 •

CVSS: 7.1EPSS: 0%CPEs: 14EXPL: 2

26 Apr 2006 — Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863. • https://www.exploit-db.com/exploits/27766 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 2

25 Apr 2006 — Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864. • https://www.exploit-db.com/exploits/27769 •

CVSS: 6.2EPSS: 0%CPEs: 143EXPL: 0

20 Apr 2006 — The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsiste... • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc • CWE-310: Cryptographic Issues •

CVSS: 5.5EPSS: 0%CPEs: 131EXPL: 0

19 Apr 2006 — ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.8 • CWE-399: Resource Management Errors •

CVSS: 5.5EPSS: 0%CPEs: 7EXPL: 0

19 Apr 2006 — madvise_remove in Linux kernel 2.6.16 up to 2.6.16.6 does not follow file and mmap restrictions, which allows local users to bypass IPC permissions and replace portions of readonly tmpfs files with zeroes, aka the MADV_REMOVE vulnerability. NOTE: this description was originally written in a way that combined two separate issues. The mprotect issue now has a separate name, CVE-2006-2071. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.1EPSS: 0%CPEs: 138EXPL: 0

18 Apr 2006 — Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.5 • CWE-20: Improper Input Validation •

CVSS: 5.5EPSS: 0%CPEs: 80EXPL: 0

14 Apr 2006 — perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function. perfmon (perfmon.c) en kernel de Linux en arquitecturas IA64 permiten a usuarios locales provocar una denegación de servicio (caída) mediante la interrupción de una tarea mientras otro proceso está accediendo al mm_struct, lo que desencadena una acción BUG_ON... • http://marc.info/?l=linux-ia64&m=113882384921688 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

12 Apr 2006 — The __group_complete_signal function in the RCU signal handling (signal.c) in Linux kernel 2.6.16, and possibly other versions, has unknown impact and attack vectors related to improper use of BUG_ON. La función __group_complete_signal en el manejo de señales RCU (signal.c) en el kernel de Linux 2.6.16 y posiblemente otras versiones, tienen vectores de impacto y ataque desconocidos relacionados con el uso incorrecto de BUG_ON. • http://marc.info/?l=linux-kernel&m=114476543426600&w=2 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

10 Apr 2006 — The sys_add_key function in the keyring code in Linux kernel 2.6.16.1 and 2.6.17-rc1, and possibly earlier versions, allows local users to cause a denial of service (OOPS) via keyctl requests that add a key to a user key instead of a keyring key, which causes an invalid dereference in the __keyring_search_one function. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.3 • CWE-20: Improper Input Validation •