Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-2071

Опубликовано: 27 апр. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 2.1

Описание

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

РелизСтатусПримечание
devel

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 30%
0.00107
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

nvd
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

debian
больше 19 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass ...

github
больше 3 лет назад

Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.

EPSS

Процентиль: 30%
0.00107
Низкий

2.1 Low

CVSS2