2.1
CVSSv2

CVE-2006-1052

Published: 05/05/2006 Updated: 30/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.0

linux linux kernel 2.6.1

linux linux kernel 2.6.11

linux linux kernel 2.6.11.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.11.10

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.8

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.12

linux linux kernel 2.6.10

linux linux kernel 2.6.11.3

linux linux kernel 2.6.11.4

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.4

linux linux kernel 2.6.13

linux linux kernel 2.6.14.3

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14

linux linux kernel 2.6.15.7

linux linux kernel 2.6.15

linux linux kernel 2.6.16

linux linux kernel 2.6.16.1

linux linux kernel 2.6.6

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11.2

linux linux kernel 2.6.11.9

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.2

linux linux kernel 2.6.13.4

linux linux kernel 2.6.14.1

linux linux kernel 2.6.14.2

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15.6

linux linux kernel 2.6.16.7

linux linux kernel 2.6.16.8

linux linux kernel 2.6.17

linux linux kernel 2.6.7

linux linux kernel 2.6.8.1.5

linux linux kernel 2.6.9

linux linux kernel 2.6.11.6

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13.1

linux linux kernel 2.6.14.5

linux linux kernel 2.6.14.6

linux linux kernel 2.6.15.1

linux linux kernel 2.6.16.12

linux linux kernel 2.6.16.2

linux linux kernel 2.6.8

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.13.2

linux linux kernel 2.6.13.3

linux linux kernel 2.6.14.7

linux linux kernel 2.6.15.2

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15.4

linux linux kernel 2.6.16.3

linux linux kernel 2.6.16.4

linux linux kernel 2.6.16_rc7

linux linux kernel 2.6.8.1

Vendor Advisories

The sys_mbind() function did not properly verify the validity of the ‘maxnod’ argument A local user could exploit this to trigger a buffer overflow, which caused a kernel crash (CVE-2006-0557) ...
This advisory covers the S/390 components of the recent security update for the Linux 268 kernel that were missing due to technical problems For reference, please see the text of the original advisory Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitr ...