CVE-2006-0038
https://notcve.org/view.php?id=CVE-2006-0038
Integer overflow in the do_replace function in netfilter for Linux before 2.6.16-rc3, when using "virtualization solutions" such as OpenVZ, allows local users with CAP_NET_ADMIN rights to cause a buffer overflow in the copy_from_user function. • http://secunia.com/advisories/19330 http://secunia.com/advisories/20671 http://secunia.com/advisories/20716 http://secunia.com/advisories/20914 http://secunia.com/advisories/21465 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006/dsa-1097 http://www.debian.org/security/2006/dsa-1103 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ee4bb818ae35f68d1f848eae0a • CWE-189: Numeric Errors •
CVE-2006-1242
https://notcve.org/view.php?id=CVE-2006-1242
The ip_push_pending_frames function in Linux 2.4.x and 2.6.x before 2.6.16 increments the IP ID field when sending a RST after receiving unsolicited TCP SYN-ACK packets, which allows remote attackers to conduct an Idle Scan (nmap -sI) attack, which bypasses intended protections against such attacks. • http://secunia.com/advisories/19402 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/20398 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/21136 http://secunia.com/advisories/21465 http://secunia.com/advisories/21983 http://secunia.com/advisories/22417 http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm http://support.avaya.com/elmodocs2/security/ASA-2006-200. •
CVE-2006-0482
https://notcve.org/view.php?id=CVE-2006-0482
Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call. El kernel de Linux 2.6.15.1 y versiones anteriores, cuando se ejecuta en arquitecturas SPARC, permite a usuarios locales provocar una denegación de servicio (cuelgue) a través del comando "date-s", lo que provoca argumentos de señal extendida no válidos para ser proporcionados a la llamada a la función get_compat_timespec. • http://lists.debian.org/debian-sparc/2006/01/msg00129.html http://marc.info/?l=linux-sparc&m=113861010514065&w=2 http://marc.info/?l=linux-sparc&m=113861287813463&w=2 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.securityfocus.com/bid/17216 http://www.vupen.com/english/advisories/2006/0418 https://exchange.xforce.ibmcloud.com/vulnerabilities/24475 •
CVE-2005-4618
https://notcve.org/view.php?id=CVE-2005-4618
Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://secunia.com/advisories/18216 http://secunia.com/advisories/18527 http://secunia.com/advisories/19369 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.debian.org/security/2006/dsa-1018 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8febdd85adaa41fa1fc1cb31286210fc2cd3ed0c http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2& •
CVE-2005-4635
https://notcve.org/view.php?id=CVE-2005-4635
The nl_fib_input function in fib_frontend.c in the Linux kernel before 2.6.15 does not check for valid lengths of the header and payload, which allows remote attackers to cause a denial of service (invalid memory reference) via malformed fib_lookup netlink messages. • http://secunia.com/advisories/18216 http://secunia.com/advisories/18788 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea86575eaf99a9262a969309d934318028dbfacb http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.15 http://www.novell.com/linux/security/advisories/2006_06_kernel.html http://www.securityfocus.com/bid/16139 http://www.vupen.com/english/advisories/2006/0035 •