CVE-2007-0772
https://notcve.org/view.php?id=CVE-2007-0772
20 Feb 2007 — The Linux kernel 2.6.13 and other versions before 2.6.20.1 allows remote attackers to cause a denial of service (oops) via a crafted NFSACL 2 ACCESS request that triggers a free of an incorrect pointer. El kernel de Linux versión 2.6.13 y otras versiones anteriores a 2.6.20.1, permite a atacantes remotos causar una denegación de servicio (oops) por medio de una petición NFSACL 2 ACCESS que desencadena una liberación de un puntero incorrecto. • http://fedoranews.org/cms/node/2739 • CWE-399: Resource Management Errors •
CVE-2007-0006
https://notcve.org/view.php?id=CVE-2007-0006
06 Feb 2007 — The key serial number collision avoidance code in the key_alloc_serial function in Linux kernel 2.6.9 up to 2.6.20 allows local users to cause a denial of service (crash) via vectors that trigger a null dereference, as originally reported as "spinlock CPU recursion." El código de prevención de colisiones de números de serial de claves en la función key_alloc_serial en el kernel de Linux versiones 2.6.9 hasta 2.6.20, permite a usuarios locales causar una denegación de servicio (bloqueo) por medio de vectores... • http://bugzilla.kernel.org/show_bug.cgi?id=7727 •
CVE-2006-5754
https://notcve.org/view.php?id=CVE-2006-5754
30 Jan 2007 — The aio_setup_ring function in Linux kernel does not properly initialize a variable, which allows local users to cause a denial of service (crash) via an unspecified error path that causes an incorrect free operation. La función aio_setup_ring en el kernel de Linux no inicializa adecuadamente una variable, lo cual permite a usuarios locales provocar denegación de servicio (caida) a través de rutas no especificadas erroneas que provocan una operación libre incorrecta. • http://rhn.redhat.com/errata/RHSA-2007-0014.html •
CVE-2006-5749
https://notcve.org/view.php?id=CVE-2006-5749
31 Dec 2006 — The isdn_ppp_ccp_reset_alloc_state function in drivers/isdn/isdn_ppp.c in the Linux 2.4 kernel before 2.4.34-rc4 does not call the init_timer function for the ISDN PPP CCP reset state timer, which has unknown attack vectors and results in a system crash. La función isdn_ppp_ccp_reset_alloc_state en el drivers/isdn/isdn_ppp.c del kernel del Linu 2.4 anterior al 2.4.34-rc4 no llama a la función init_timer para restaurar el estado del temporizador ISDN PPP CCP, lo cual genera vectores de ataque desconocidos y,... • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.34 •
CVE-2006-5755 – kernel: local denial of service due to NT bit leakage
https://notcve.org/view.php?id=CVE-2006-5755
31 Dec 2006 — Linux kernel before 2.6.18, when running on x86_64 systems, does not properly save or restore EFLAGS during a context switch, which allows local users to cause a denial of service (crash) by causing SYSENTER to set an NT flag, which can trigger a crash on the IRET of the next task. El núcleo de Linux anterior a 2.6.18, cuando se ejecuta en sistemas x86_64, no guarda o restaura adecuadamente las EFLAGS durante un cambio de contexto, lo cual permite a usuarios locales provocar una denegación de servicio (caíd... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=658fdbef66e5e9be79b457edc2cbbb3add840aa9 •
CVE-2006-4814 – kernel Race condition in mincore can cause "ps -ef" to hang
https://notcve.org/view.php?id=CVE-2006-4814
20 Dec 2006 — The mincore function in the Linux kernel before 2.4.33.6 does not properly lock access to user space, which has unspecified impact and attack vectors, possibly related to a deadlock. La función mincore en el núcleo de Linux anterior a 2.4.33.6 no bloquea adecuadamente el acceso al espacio del usuario, lo cual tiene impacto y vectores de ataque no especificados, posiblemente relativos a un bloqueo mortal. • https://github.com/tagatac/linux-CVE-2006-4814 • CWE-399: Resource Management Errors •
CVE-2006-6106
https://notcve.org/view.php?id=CVE-2006-6106
19 Dec 2006 — Multiple buffer overflows in the cmtp_recv_interopmsg function in the Bluetooth driver (net/bluetooth/cmtp/capi.c) in the Linux kernel 2.4.22 up to 2.4.33.4 and 2.6.2 before 2.6.18.6, and 2.6.19.x, allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via CAPI messages with a large value for the length of the (1) manu (manufacturer) or (2) serial (serial number) field. Múltiples desbordamientos de búfer en la función cmtp_recv_interopmsg en el controlador Bluetooth ... • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.5 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2006-5871
https://notcve.org/view.php?id=CVE-2006-5871
11 Dec 2006 — smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings. smbfs en el núcleo de Linux 2.6.8 y otras versiones, y 2.4.x anterior a 2.4.34, cuando las extensiones UNIX están habilitadas, ignora determinadas opciones de montaje (mount options), lo cual podría provocar que los clientes utilicen un uid, gid y una configuración de modos (mode settings) espec... • http://secunia.com/advisories/23361 •
CVE-2006-4572
https://notcve.org/view.php?id=CVE-2006-4572
07 Nov 2006 — ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug." ip6_tables en netfilter en el núcleo de Linux anterior a 2.6.16.31 permite ... • http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-5173
https://notcve.org/view.php?id=CVE-2006-5173
17 Oct 2006 — Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access. El núcleo de Linux no guarda o restaura adecuadamente EFLAGS durante un cambio de contexto, o reinicia las banderas al crear nuevos hilos, lo cual permite a ... • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=47a5c6fa0e204a2b63309c648bb2fde36836c826 •