CVE-2006-1052
https://notcve.org/view.php?id=CVE-2006-1052
The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process. La lógica selinux_ptrace en hooks.c en SELinux para Linux 2.6.6 permite a usuarios locales con permisos ptrace cambiar el trazador SID a un SID de otro proceso. • http://marc.info/?l=git-commits-head&m=114210002712363&w=2 http://marc.info/?l=selinux&m=114226465106131&w=2 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/21465 http://secunia.com/advisories/22093 http://secunia.com/advisories/22417 http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006 •
CVE-2006-1527
https://notcve.org/view.php?id=CVE-2006-1527
The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function. • http://secunia.com/advisories/19926 http://secunia.com/advisories/20157 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20716 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.13 http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 http://www.novell.com/linux/security/advisories/2006-05-31.html http& •
CVE-2006-2071
https://notcve.org/view.php?id=CVE-2006-2071
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 http://secunia.com/advisories/20157 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/22292 http://secunia.com/advisories/22497 http://secunia.com/advisories/22875 http://secunia.com/advisories/22945 http://secunia.com/advisories/23064 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm ht •
CVE-2006-1864 – Linux Kernel 2.6.x - SMBFS CHRoot Security Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1864
Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863. • https://www.exploit-db.com/exploits/27766 http://secunia.com/advisories/19869 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21035 http://secunia.com/advisories/21476 http://secunia.com/advisories/21614 http://secunia.com/advisories/21745 http://secunia.com/advisories/22497 http://secunia.com/advisories/22875 ht •
CVE-2006-1863 – Linux Kernel 2.6.x - CIFS CHRoot Security Restriction Bypass
https://notcve.org/view.php?id=CVE-2006-1863
Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864. • https://www.exploit-db.com/exploits/27769 http://rhn.redhat.com/errata/RHBA-2007-0304.html http://secunia.com/advisories/19868 http://secunia.com/advisories/20398 http://secunia.com/advisories/20914 http://secunia.com/advisories/21614 http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=296034f7de8bdf111984ce1630ac598a9c94a253 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.11 http •