Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j54m-wqrg-jj5r

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

Ссылки

EPSS

Процентиль: 30%
0.00107
Низкий

Связанные уязвимости

ubuntu
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

redhat
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

nvd
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

debian
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass ...

EPSS

Процентиль: 30%
0.00107
Низкий