7.5
CVSSv2

CVE-2006-1856

Published: 19/05/2006 Updated: 11/10/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Certain modifications to the Linux kernel 2.6.16 and previous versions do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow malicious users to bypass intended access restrictions.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.0

linux linux kernel 2.6.11.11

linux linux kernel 2.6.11.12

linux linux kernel 2.6.11

linux linux kernel 2.6.12.1

linux linux kernel 2.6.12.2

linux linux kernel 2.6.12

linux linux kernel 2.6.13

linux linux kernel 2.6.14

linux linux kernel 2.6.15.5

linux linux kernel 2.6.15

linux linux kernel 2.6.6

linux linux kernel 2.6_test9_cvs

linux linux kernel 2.6.1

linux linux kernel 2.6.11.5

linux linux kernel 2.6.11.6

linux linux kernel 2.6.12.3

linux linux kernel 2.6.12.4

linux linux kernel 2.6.13.1

linux linux kernel 2.6.13.2

linux linux kernel 2.6.14.1

linux linux kernel 2.6.16

linux linux kernel 2.6.7

linux linux kernel 2.6.10

linux linux kernel 2.6.14.4

linux linux kernel 2.6.14.5

linux linux kernel 2.6.15.3

linux linux kernel 2.6.15.4

linux linux kernel 2.6.4

linux linux kernel 2.6.5

linux linux kernel 2.6.8

linux linux kernel 2.6.9

linux linux kernel 2.6.11.7

linux linux kernel 2.6.11.8

linux linux kernel 2.6.12.5

linux linux kernel 2.6.12.6

linux linux kernel 2.6.13.3

linux linux kernel 2.6.13.4

linux linux kernel 2.6.14.2

linux linux kernel 2.6.14.3

linux linux kernel 2.6.15.1

linux linux kernel 2.6.15.2

linux linux kernel 2.6.2

linux linux kernel 2.6.3

Vendor Advisories

An integer overflow was discovered in the do_replace() function A local user process with the CAP_NET_ADMIN capability could exploit this to execute arbitrary commands with full root privileges However, none of Ubuntu’s supported packages use this capability with any non-root user, so this only affects you if you use some third party software l ...
This advisory covers the S/390 components of the recent security update for the Linux 268 kernel that were missing due to technical problems For reference, please see the text of the original advisory Several security related problems have been discovered in the Linux kernel which may lead to a denial of service or even the execution of arbitr ...