Show filters
191 Total Results
Displaying 131-140 of 191
Sort by:
Attacker Value
Unknown

CVE-2006-1855

Disclosure Date: May 18, 2006 (last updated October 04, 2023)
choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process.
0
Attacker Value
Unknown

CVE-2006-1052

Disclosure Date: May 05, 2006 (last updated October 04, 2023)
The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process.
0
Attacker Value
Unknown

CVE-2006-2071

Disclosure Date: April 27, 2006 (last updated October 04, 2023)
Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
0
Attacker Value
Unknown

CVE-2006-1056

Disclosure Date: April 20, 2006 (last updated October 04, 2023)
The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys. NOTE: this is the documented behavior of AMD64 processors, but it is inconsistent with Intel processors in a security-relevant fashion that was not addressed by the kernels.
0
Attacker Value
Unknown

CVE-2006-1525

Disclosure Date: April 19, 2006 (last updated October 04, 2023)
ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
0
Attacker Value
Unknown

CVE-2006-0744

Disclosure Date: April 18, 2006 (last updated October 04, 2023)
Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
0
Attacker Value
Unknown

CVE-2006-0558

Disclosure Date: April 14, 2006 (last updated October 04, 2023)
perfmon (perfmon.c) in Linux kernel on IA64 architectures allows local users to cause a denial of service (crash) by interrupting a task while another process is accessing the mm_struct, which triggers a BUG_ON action in the put_page_testzero function.
0
Attacker Value
Unknown

CVE-2006-1066

Disclosure Date: March 27, 2006 (last updated February 22, 2025)
Linux kernel 2.6.16-rc2 and earlier, when running on x86_64 systems with preemption enabled, allows local users to cause a denial of service (oops) via multiple ptrace tasks that perform single steps, which can cause corruption of the DEBUG_STACK stack during the do_debug function call.
0
Attacker Value
Unknown

CVE-2006-0038

Disclosure Date: March 22, 2006 (last updated February 22, 2025)
Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function.
0
Attacker Value
Unknown

CVE-2006-1242

Disclosure Date: March 15, 2006 (last updated February 22, 2025)
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
0