7.1

CVE-2006-0457

Race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in Linux kernel 2.6.x allows local users to cause a denial of service (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version2.6.0
LinuxLinux Kernel Version2.6.0 Updatetest1
LinuxLinux Kernel Version2.6.0 Updatetest10
LinuxLinux Kernel Version2.6.0 Updatetest11
LinuxLinux Kernel Version2.6.0 Updatetest2
LinuxLinux Kernel Version2.6.0 Updatetest3
LinuxLinux Kernel Version2.6.0 Updatetest4
LinuxLinux Kernel Version2.6.0 Updatetest5
LinuxLinux Kernel Version2.6.0 Updatetest6
LinuxLinux Kernel Version2.6.0 Updatetest7
LinuxLinux Kernel Version2.6.0 Updatetest8
LinuxLinux Kernel Version2.6.0 Updatetest9
LinuxLinux Kernel Version2.6.1
LinuxLinux Kernel Version2.6.1 Updaterc1
LinuxLinux Kernel Version2.6.1 Updaterc2
LinuxLinux Kernel Version2.6.3
LinuxLinux Kernel Version2.6.4
LinuxLinux Kernel Version2.6.5
LinuxLinux Kernel Version2.6.6
LinuxLinux Kernel Version2.6.6 Updaterc1
LinuxLinux Kernel Version2.6.7
LinuxLinux Kernel Version2.6.7 Updaterc1
LinuxLinux Kernel Version2.6.8
LinuxLinux Kernel Version2.6.8 Updaterc1
LinuxLinux Kernel Version2.6.8 Updaterc2
LinuxLinux Kernel Version2.6.8 Updaterc3
LinuxLinux Kernel Version2.6.8.1
LinuxLinux Kernel Version2.6.8.1.5
LinuxLinux Kernel Version2.6.9 Update2.6.20
LinuxLinux Kernel Version2.6.10
LinuxLinux Kernel Version2.6.10 Updaterc2
LinuxLinux Kernel Version2.6.11
LinuxLinux Kernel Version2.6.11 Updaterc1
LinuxLinux Kernel Version2.6.11 Updaterc2
LinuxLinux Kernel Version2.6.11 Updaterc3
LinuxLinux Kernel Version2.6.11 Updaterc4
LinuxLinux Kernel Version2.6.11.1
LinuxLinux Kernel Version2.6.11.2
LinuxLinux Kernel Version2.6.11.3
LinuxLinux Kernel Version2.6.11.4
LinuxLinux Kernel Version2.6.11.5
LinuxLinux Kernel Version2.6.11.6
LinuxLinux Kernel Version2.6.11.7
LinuxLinux Kernel Version2.6.11.8
LinuxLinux Kernel Version2.6.11.9
LinuxLinux Kernel Version2.6.11.10
LinuxLinux Kernel Version2.6.11.11
LinuxLinux Kernel Version2.6.11.12
LinuxLinux Kernel Version2.6.11_rc1_bk6
LinuxLinux Kernel Version2.6.12
LinuxLinux Kernel Version2.6.12 Updaterc1
LinuxLinux Kernel Version2.6.12 Updaterc4
LinuxLinux Kernel Version2.6.12 Updaterc5
LinuxLinux Kernel Version2.6.12.1
LinuxLinux Kernel Version2.6.12.2
LinuxLinux Kernel Version2.6.12.3
LinuxLinux Kernel Version2.6.12.4
LinuxLinux Kernel Version2.6.12.5
LinuxLinux Kernel Version2.6.12.6
LinuxLinux Kernel Version2.6.13
LinuxLinux Kernel Version2.6.13 Updaterc1
LinuxLinux Kernel Version2.6.13 Updaterc4
LinuxLinux Kernel Version2.6.13 Updaterc6
LinuxLinux Kernel Version2.6.13 Updaterc7
LinuxLinux Kernel Version2.6.13.1
LinuxLinux Kernel Version2.6.13.2
LinuxLinux Kernel Version2.6.13.3
LinuxLinux Kernel Version2.6.13.4
LinuxLinux Kernel Version2.6.14
LinuxLinux Kernel Version2.6.14 Updaterc1
LinuxLinux Kernel Version2.6.14 Updaterc2
LinuxLinux Kernel Version2.6.14 Updaterc3
LinuxLinux Kernel Version2.6.14 Updaterc4
LinuxLinux Kernel Version2.6.14.1
LinuxLinux Kernel Version2.6.14.2
LinuxLinux Kernel Version2.6.14.3
LinuxLinux Kernel Version2.6.14.4
LinuxLinux Kernel Version2.6.15
LinuxLinux Kernel Version2.6.15 Updaterc1
LinuxLinux Kernel Version2.6.15 Updaterc3
LinuxLinux Kernel Version2.6.15 Updaterc4
LinuxLinux Kernel Version2.6.15 Updaterc5
LinuxLinux Kernel Version2.6.15 Updaterc6
LinuxLinux Kernel Version2.6.15 Updaterc7
LinuxLinux Kernel Version2.6.15.1
LinuxLinux Kernel Version2.6.15.2
LinuxLinux Kernel Version2.6.15.3
LinuxLinux Kernel Version2.6.15.4
LinuxLinux Kernel Version2.6.15.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 1.5% 0.793
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.1 4.9 9.2
AV:N/AC:H/Au:N/C:C/I:N/A:C