CVE-2006-5619
https://notcve.org/view.php?id=CVE-2006-5619
31 Oct 2006 — The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in Linux kernel 2.6 up to 2.6.18-stable allows local users to cause a denial of service (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels. El manejo de (seqfile) ficheros secuenciales (función ip6fl_get_n en ip6_flowlabel.c) en el núcleo de Linux 2.6 hasta 2.6.18-stable permite a usuarios locales provocar una denegación de servicio (cuelgue o "oops") mediante manipulaciones no especificadas... • http://lkml.org/lkml/2006/11/5/46 • CWE-399: Resource Management Errors •
CVE-2006-5173
https://notcve.org/view.php?id=CVE-2006-5173
17 Oct 2006 — Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access. El núcleo de Linux no guarda o restaura adecuadamente EFLAGS durante un cambio de contexto, o reinicia las banderas al crear nuevos hilos, lo cual permite a ... • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=47a5c6fa0e204a2b63309c648bb2fde36836c826 •
CVE-2006-4813
https://notcve.org/view.php?id=CVE-2006-4813
12 Oct 2006 — The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked. La función __block_prepare_write en fs/buffer.c para Linux kernel 2.6.x anteriores a 2.6.13 no limpia correctamente los búferes durante ciertas condiciones de error, que permite a usuarios locales leer porciones de ficheros que han sido desvinculados. • http://osvdb.org/31376 •
CVE-2006-3741
https://notcve.org/view.php?id=CVE-2006-3741
09 Oct 2006 — The perfmonctl system call (sys_perfmonctl) in Linux kernel 2.4.x and 2.6 before 2.6.18, when running on Itanium systems, does not properly track the reference count for file descriptors, which allows local users to cause a denial of service (file descriptor consumption). La llamada al sistema perfmonctl (sys_perfmonctl) en el núcleo Linux 2.4.x y 2.6 anterior a 2.6.18, cuando se ejecuta en sistemas Itanium, no lleva correctamente la cuenta de referencias a los descriptores de fichero, lo que permite a usua... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=204360 •
CVE-2006-4997
https://notcve.org/view.php?id=CVE-2006-4997
09 Oct 2006 — The clip_mkip function in net/atm/clip.c of the ATM subsystem in Linux kernel allows remote attackers to cause a denial of service (panic) via unknown vectors that cause the ATM subsystem to access the memory of socket buffers after they are freed (freed pointer dereference). La función clip_mkip en net/atm/clip.c del subsistema ATM en el núcleo Linux permite a atacantes remotos provocar una denegación de servicio (panico) mediante vectores no identificados que provocan que el subsisstema ATM acceda a la me... • http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=206265 • CWE-416: Use After Free •
CVE-2006-5174
https://notcve.org/view.php?id=CVE-2006-5174
05 Oct 2006 — The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. La función copy_from_user en el código uaccess en Linux kernel 2.6 anterior a 2.6.19-rc1, cuando funciona sobre s390, no correctamente claro un búfe... • http://lkml.org/lkml/2006/11/5/46 •
CVE-2006-5158 – NFS lockd deadlock
https://notcve.org/view.php?id=CVE-2006-5158
03 Oct 2006 — The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock. El nlmclnt_mark_reclaim en clntlock.c en NFS lockd en el kernel de Linux en versiones anteriores a 2.6.16 permite a atacantes remotos provocar una denegación de servicio (caída de proceso) y denegación de acceso a exportaciones NFS a través de ... • http://marc.info/?l=linux-kernel&m=113476665626446&w=2 • CWE-667: Improper Locking •
CVE-2006-4535
https://notcve.org/view.php?id=CVE-2006-4535
19 Sep 2006 — The Linux kernel 2.6.17.10 and 2.6.17.11 and 2.6.18-rc5 allows local users to cause a denial of service (crash) via an SCTP socket with a certain SO_LINGER value, possibly related to the patch for CVE-2006-3745. NOTE: older kernel versions for specific Linux distributions are also affected, due to backporting of the CVE-2006-3745 patch. El Linux kernel 2.6.17.10 y 2.6.17.11 y 2.6.18-rc5 permite a usuarios locales provocar una denegación de servicio (caída) vía un socket SCTP con un cierto valor SO_LINGER, p... • http://secunia.com/advisories/21945 • CWE-399: Resource Management Errors •
CVE-2006-4623
https://notcve.org/view.php?id=CVE-2006-4623
11 Sep 2006 — The Unidirectional Lightweight Encapsulation (ULE) decapsulation component in dvb-core/dvb_net.c in the dvb driver in the Linux kernel 2.6.17.8 allows remote attackers to cause a denial of service (crash) via an SNDU length of 0 in a ULE packet. EL componente de desencapsulación Unidirectional Lightweight Encapsulation (ULE) en dvb-core/dvb_net.c en el controlador dvb en el Kernel 2.6.17.8 de Linux permite a un atacante remoto provocar una denegación de servicio (caida) a través de la longitud SNDU de 0 en ... • http://lkml.org/lkml/2006/8/20/278 •
CVE-2006-4663
https://notcve.org/view.php?id=CVE-2006-4663
09 Sep 2006 — The source code tar archive of the Linux kernel 2.6.16, 2.6.17.11, and possibly other versions specifies weak permissions (0666 and 0777) for certain files and directories, which might allow local users to insert Trojan horse source code that would be used during the next kernel compilation. NOTE: another researcher disputes the vulnerability, stating that he finds "Not a single world-writable file or directory." CVE analysis as of 20060908 indicates that permissions will only be weak under certain unusual ... • http://www.securityfocus.com/archive/1/445539/100/0/threaded •