Vulnerabilities > Linux > Linux Kernel > 2.6.15.5

DATE CVE VULNERABILITY TITLE RISK
2006-05-05 CVE-2006-1052 Local Denial of Service vulnerability in Linux Kernel SELinux_PTrace
The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process.
local
low complexity
linux
2.1
2006-04-20 CVE-2006-1056 Cryptographic Issues vulnerability in multiple products
The Linux kernel before 2.6.16.9 and the FreeBSD kernel, when running on AMD64 and other 7th and 8th generation AuthenticAMD processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one process to determine portions of the state of floating point instructions of other processes, which can be leveraged to obtain sensitive information such as cryptographic keys.
local
low complexity
freebsd linux CWE-310
2.1
2006-04-19 CVE-2006-1525 Resource Management Errors vulnerability in Linux Kernel
ip_route_input in Linux kernel 2.6 before 2.6.16.8 allows local users to cause a denial of service (panic) via a request for a route for a multicast IP address, which triggers a null dereference.
local
low complexity
linux CWE-399
4.9
2006-04-18 CVE-2006-0744 Improper Input Validation vulnerability in Linux Kernel
Linux kernel before 2.6.16.5 does not properly handle uncanonical return addresses on Intel EM64T CPUs, which reports an exception in the SYSRET instead of the next instruction, which causes the kernel exception handler to run on the user stack with the wrong GS.
local
low complexity
linux CWE-20
4.9
2006-03-15 CVE-2006-1242 Unspecified vulnerability in Linux Kernel
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks.
network
low complexity
linux
5.0
2006-03-14 CVE-2006-0457 Local Copy_To_User Race vulnerability in Linux Kernel Security Key Functions
Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory.
network
high complexity
linux
7.1