
CVE-2006-3085
https://notcve.org/view.php?id=CVE-2006-3085
23 Jun 2006 — xt_sctp in netfilter for Linux kernel before 2.6.17.1 allows attackers to cause a denial of service (infinite loop) via an SCTP chunk with a 0 length. xt_sctp en netfilter para el kernel Linux anterior a v2.6.17.1 permite a atacantes provocar una denegación de servivio (bucle infinito) a través de un fragmento SCTP con longitud 0 (cero). • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.17.1 •

CVE-2006-2916
https://notcve.org/view.php?id=CVE-2006-2916
15 Jun 2006 — artswrapper in aRts, when running setuid root on Linux 2.6.0 or later versions, does not check the return value of the setuid function call, which allows local users to gain root privileges by causing setuid to fail, which prevents artsd from dropping privileges. artswrapper en aRts, cuando se ejecuta como root sobre linux 2.6.0 o versiones posteriores, no valida la variable setuid de retorno de la llamada a la función, lo que permite a usuarios locales ganar privilegios de root al provocar un fallo sobre s... • http://dot.kde.org/1150310128 • CWE-273: Improper Check for Dropped Privileges •

CVE-2006-2444 – Linux Kernel < 2.6.16.18 - Netfilter NAT SNMP Module Remote Denial of Service
https://notcve.org/view.php?id=CVE-2006-2444
25 May 2006 — The snmp_trap_decode function in the SNMP NAT helper for Linux kernel before 2.6.16.18 allows remote attackers to cause a denial of service (crash) via unspecified remote attack vectors that cause failures in snmp_trap_decode that trigger (1) frees of random memory or (2) frees of previously-freed memory (double-free) by snmp_trap_decode as well as its calling function, as demonstrated via certain test cases of the PROTOS SNMP test suite. • https://www.exploit-db.com/exploits/1880 •

CVE-2006-1862
https://notcve.org/view.php?id=CVE-2006-1862
24 May 2006 — The virtual memory implementation in Linux kernel 2.6.x allows local users to cause a denial of service (panic) by running lsof a large number of times in a way that produces a heavy system load. • http://osvdb.org/31663 •

CVE-2006-1858
https://notcve.org/view.php?id=CVE-2006-1858
22 May 2006 — SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a chunk length that is inconsistent with the actual length of provided parameters. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 • CWE-20: Improper Input Validation •

CVE-2006-1857
https://notcve.org/view.php?id=CVE-2006-1857
22 May 2006 — Buffer overflow in SCTP in Linux kernel before 2.6.16.17 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a malformed HB-ACK chunk. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2006-1856
https://notcve.org/view.php?id=CVE-2006-1856
19 May 2006 — Certain modifications to the Linux kernel 2.6.16 and earlier do not add the appropriate Linux Security Modules (LSM) file_permission hooks to the (1) readv and (2) writev functions, which might allow attackers to bypass intended access restrictions. • http://lists.jammed.com/linux-security-module/2005/09/0019.html •

CVE-2006-1528
https://notcve.org/view.php?id=CVE-2006-1528
18 May 2006 — Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 • CWE-20: Improper Input Validation •

CVE-2006-1052
https://notcve.org/view.php?id=CVE-2006-1052
05 May 2006 — The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process. La lógica selinux_ptrace en hooks.c en SELinux para Linux 2.6.6 permite a usuarios locales con permisos ptrace cambiar el trazador SID a un SID de otro proceso. • http://marc.info/?l=git-commits-head&m=114210002712363&w=2 •

CVE-2006-2071
https://notcve.org/view.php?id=CVE-2006-2071
27 Apr 2006 — Linux kernel 2.4.x and 2.6.x up to 2.6.16 allows local users to bypass IPC permissions and modify a readonly attachment of shared memory by using mprotect to give write permission to the attachment. NOTE: some original raw sources combined this issue with CVE-2006-1524, but they are different bugs. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.6 •