Page 977 of 5206 results (0.031 seconds)

CVSS: 2.1EPSS: 0%CPEs: 157EXPL: 0

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 http://secunia.com/advisories/20157 http://secunia.com/advisories/20716 http://secunia.com/advisories/21035 http://secunia.com/advisories/22292 http://secunia.com/advisories/22497 http://secunia.com/advisories/22875 http://secunia.com/advisories/22945 http://secunia.com/advisories/23064 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm ht •

CVSS: 4.6EPSS: 0%CPEs: 14EXPL: 2

Directory traversal vulnerability in smbfs in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1863. • https://www.exploit-db.com/exploits/27766 http://secunia.com/advisories/19869 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21035 http://secunia.com/advisories/21476 http://secunia.com/advisories/21614 http://secunia.com/advisories/21745 http://secunia.com/advisories/22497 http://secunia.com/advisories/22875 ht •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 2

Directory traversal vulnerability in CIFS in Linux 2.6.16 and earlier allows local users to escape chroot restrictions for an SMB-mounted filesystem via "..\\" sequences, a similar vulnerability to CVE-2006-1864. • https://www.exploit-db.com/exploits/27769 http://rhn.redhat.com/errata/RHBA-2007-0304.html http://secunia.com/advisories/19868 http://secunia.com/advisories/20398 http://secunia.com/advisories/20914 http://secunia.com/advisories/21614 http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=296034f7de8bdf111984ce1630ac598a9c94a253 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.11 http •

CVSS: 2.1EPSS: 0%CPEs: 143EXPL: 0

The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels. El kernel de Linux en versiones anteriores a 2.6.16.9 y el kernel de FreeBSD, cuando se ejecuta en AMD64 y otros procesadores AuthenticAMD de 7ª y 8ª generación, solo guarda/restablece los registros FOP, FIP y FDP x87 en FXSAVE/FXRSTOR cuando una excepción está pendiente, lo que permite un proceso para determinar las porciones del estado de instrucciones de punto flotante de otros procesos, lo que puede ser aprovechado para obtener información sensible como claves criptográficas. NOTA: este es un comportamiento documentado de procesadores AMD64, pero es inconsistente con procesadores Intel en una forma relevante para la seguridad que no fue abordada por los kernels. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc http://kb.vmware.com/kb/2533126 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9 http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lwn.net/Alerts/180820 http://marc.info/?l=linux-kernel&m=114548768214478&w=2 http://secunia.com/advisories/19715 http://secunia.com/advisories/19724 http://secunia.com/advisories/19735 http://secunia.com/advisories& • CWE-310: Cryptographic Issues •

CVSS: 4.9EPSS: 0%CPEs: 131EXPL: 0

ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.8 http://lwn.net/Alerts/180820 http://secunia.com/advisories/19709 http://secunia.com/advisories/19735 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/21476 http://secunia.com/advisories/21745 http://support. • CWE-399: Resource Management Errors •