CVE
- Id
- 18175
- CVE No.
- CVE-2006-2071
- Status
- Candidate
- Description
- Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs.
- Phase
- Assigned (20060427)
- Votes
- None (candidate not yet proposed)
- Comments
Related CVE References
Id | CVE Id | CVE No. | Reference | Actions |
---|---|---|---|---|
156623 | 18175 | CVE-2006-2071 | BUGTRAQ:20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4 | View |
156624 | 18175 | CVE-2006-2071 | URL:http://www.securityfocus.com/archive/1/archive/1/451404/100/0/threaded | View |
156625 | 18175 | CVE-2006-2071 | BUGTRAQ:20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1 | View |
156626 | 18175 | CVE-2006-2071 | URL:http://www.securityfocus.com/archive/1/archive/1/451419/100/200/threaded | View |
156627 | 18175 | CVE-2006-2071 | BUGTRAQ:20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2 | View |
156628 | 18175 | CVE-2006-2071 | URL:http://www.securityfocus.com/archive/1/archive/1/451417/100/200/threaded | View |
156629 | 18175 | CVE-2006-2071 | BUGTRAQ:20061113 VMSA-2006-0008 - VMware ESX Server 2.0.2 Upgrade Patch 2 | View |
156630 | 18175 | CVE-2006-2071 | URL:http://www.securityfocus.com/archive/1/archive/1/451426/100/200/threaded | View |
156631 | 18175 | CVE-2006-2071 | CONFIRM:http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 | View |
156632 | 18175 | CVE-2006-2071 | CONFIRM:http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=b78b6af66a5fbaf17d7e6bfc32384df5e34408c8 | View |
156633 | 18175 | CVE-2006-2071 | CONFIRM:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=190073 | View |
156634 | 18175 | CVE-2006-2071 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm | View |
156635 | 18175 | CVE-2006-2071 | CONFIRM:http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm | View |
156636 | 18175 | CVE-2006-2071 | CONFIRM:http://www.vmware.com/download/esx/esx-202-200610-patch.html | View |
156637 | 18175 | CVE-2006-2071 | CONFIRM:http://www.vmware.com/download/esx/esx-213-200610-patch.html | View |
156638 | 18175 | CVE-2006-2071 | CONFIRM:http://www.vmware.com/download/esx/esx-254-200610-patch.html | View |
156639 | 18175 | CVE-2006-2071 | MANDRIVA:MDKSA-2006:086 | View |
156640 | 18175 | CVE-2006-2071 | URL:http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 | View |
156641 | 18175 | CVE-2006-2071 | REDHAT:RHSA-2006:0579 | View |
156642 | 18175 | CVE-2006-2071 | URL:http://www.redhat.com/support/errata/RHSA-2006-0579.html | View |
156643 | 18175 | CVE-2006-2071 | REDHAT:RHSA-2006:0580 | View |
156644 | 18175 | CVE-2006-2071 | URL:http://www.redhat.com/support/errata/RHSA-2006-0580.html | View |
156645 | 18175 | CVE-2006-2071 | REDHAT:RHSA-2006:0689 | View |
156646 | 18175 | CVE-2006-2071 | URL:http://www.redhat.com/support/errata/RHSA-2006-0689.html | View |
156647 | 18175 | CVE-2006-2071 | REDHAT:RHSA-2006:0710 | View |
156648 | 18175 | CVE-2006-2071 | URL:http://www.redhat.com/support/errata/RHSA-2006-0710.html | View |
156649 | 18175 | CVE-2006-2071 | UBUNTU:USN-302-1 | View |
156650 | 18175 | CVE-2006-2071 | URL:http://www.ubuntu.com/usn/usn-302-1 | View |
156651 | 18175 | CVE-2006-2071 | OVAL:oval:org.mitre.oval:def:9978 | View |
156652 | 18175 | CVE-2006-2071 | URL:http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:9978 | View |
156653 | 18175 | CVE-2006-2071 | VUPEN:ADV-2006-4502 | View |
156654 | 18175 | CVE-2006-2071 | URL:http://www.vupen.com/english/advisories/2006/4502 | View |
156655 | 18175 | CVE-2006-2071 | VUPEN:ADV-2006-1391 | View |
156656 | 18175 | CVE-2006-2071 | URL:http://www.vupen.com/english/advisories/2006/1391 | View |
156657 | 18175 | CVE-2006-2071 | OSVDB:25139 | View |
156658 | 18175 | CVE-2006-2071 | URL:http://www.osvdb.org/25139 | View |
156659 | 18175 | CVE-2006-2071 | SECUNIA:20157 | View |
156660 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/20157 | View |
156661 | 18175 | CVE-2006-2071 | SECUNIA:20716 | View |
156662 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/20716 | View |
156663 | 18175 | CVE-2006-2071 | SECUNIA:21035 | View |
156664 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/21035 | View |
156665 | 18175 | CVE-2006-2071 | SECUNIA:22292 | View |
156666 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/22292 | View |
156667 | 18175 | CVE-2006-2071 | SECUNIA:22497 | View |
156668 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/22497 | View |
156669 | 18175 | CVE-2006-2071 | SECUNIA:22945 | View |
156670 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/22945 | View |
156671 | 18175 | CVE-2006-2071 | SECUNIA:22875 | View |
156672 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/22875 | View |
156673 | 18175 | CVE-2006-2071 | SECUNIA:23064 | View |
156674 | 18175 | CVE-2006-2071 | URL:http://secunia.com/advisories/23064 | View |
156675 | 18175 | CVE-2006-2071 | XF:linux-mprotect-security-bypass(26169) | View |
Related JVN
Id | JVN No. | Title | Summary | CVE No. | CVE Id | CVSS_v2 | CVSS_v3 | JVN URL | Actions |
---|---|---|---|---|---|---|---|---|---|
58047 | JVNDB-2006-000243 | BIND における不正な DNS パケットによるサービス運用妨害 (DoS) の脆弱性 | ------------ | CVE-2006-2073 | 18175 | 5 | http://jvndb.jvn.jp/ja/contents/2006/JVNDB-2006-000243.html | View |