CVE-2006-5757 – Linux Kernel 2.6.x - 'ISO9660' Denial of Service
https://notcve.org/view.php?id=CVE-2006-5757
Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures. Condición de carrera en la función __find_get_block_slow en el sistema de ficheros ISO9660 en Linux 2.6.18 y posiblemente otras versiones permite a usuarios locales provocar una denegación de servicio (bucle infinito) montando un sistema de fisheros ISO9660 manipulado que contiene estructuras de datos mal formadas. • https://www.exploit-db.com/exploits/28912 http://projects.info-pull.com/mokb/MOKB-05-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22702 http://secunia.com/advisories/22746 http://secunia.com/advisories/23474 http://secunia.com/advisories/23593 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/25691 • CWE-17: DEPRECATED: Code CWE-399: Resource Management Errors •
CVE-2006-5701 – Linux Kernel 2.6.x - SquashFS Double-Free Denial of Service
https://notcve.org/view.php?id=CVE-2006-5701
Double free vulnerability in squashfs module in the Linux kernel 2.6.x, as used in Fedora Core 5 and possibly other distributions, allows local users to cause a denial of service by mounting a crafted squashfs filesystem. Vulnerabilidad doble-libre en módulo squashfs en el kernel de Linux 2.6.x, tal y como se usa en Fedora Core 5 y posiblemente otras distribuciones, permite a un usuario local provocar denegación de servicio a través del montado manipualado del sistema de ficheros. • https://www.exploit-db.com/exploits/28895 http://projects.info-pull.com/mokb/MOKB-02-11-2006.html http://secunia.com/advisories/22655 http://secunia.com/advisories/23361 http://secunia.com/advisories/23384 http://secunia.com/advisories/24259 http://www.mandriva.com/security/advisories?name=MDKSA-2007:047 http://www.securityfocus.com/bid/20870 http://www.ubuntu.com/usn/usn-395-1 https://exchange.xforce.ibmcloud.com/vulnerabilities/29967 •
CVE-2006-5619
https://notcve.org/view.php?id=CVE-2006-5619
The seqfile handling (ip6fl_get_n function in ip6_flowlabel.c) in Linux kernel 2.6 up to 2.6.18-stable allows local users to cause a denial of service (hang or oops) via unspecified manipulations that trigger an infinite loop while searching for flowlabels. El manejo de (seqfile) ficheros secuenciales (función ip6fl_get_n en ip6_flowlabel.c) en el núcleo de Linux 2.6 hasta 2.6.18-stable permite a usuarios locales provocar una denegación de servicio (cuelgue o "oops") mediante manipulaciones no especificadas que disparan un bucle infinito al buscar etiquetas de flujo. • http://lkml.org/lkml/2006/11/5/46 http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22665 http://secunia.com/advisories/22754 http://secunia.com/advisories/23370 http://secunia.com/advisories/23384 http://secunia.com/advisories/23474 http://secunia.com/advisories/23593 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24206 http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm& • CWE-399: Resource Management Errors •
CVE-2006-5173
https://notcve.org/view.php?id=CVE-2006-5173
Linux kernel does not properly save or restore EFLAGS during a context switch, or reset the flags when creating new threads, which allows local users to cause a denial of service (process crash), as demonstrated using a process that sets the Alignment Check flag (EFLAGS 0x40000), which triggers a SIGBUS in other processes that have an unaligned access. El núcleo de Linux no guarda o restaura adecuadamente EFLAGS durante un cambio de contexto, o reinicia las banderas al crear nuevos hilos, lo cual permite a usuarios locales provocar una denegación de servicio (caída de proceso), como ha sido demostrado usando un proceso que establece la bandera Alignment Check (EFLAGS 0x40000), lo cual dispara un SIGBUS en otros procesos que tienen acceso no alineado. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=47a5c6fa0e204a2b63309c648bb2fde36836c826 http://secunia.com/advisories/23361 http://secunia.com/advisories/23384 http://secunia.com/advisories/23474 http://secunia.com/advisories/23593 http://secunia.com/advisories/25691 http://www.mandriva.com/security/advisories?name=MDKSA-2007:002 http://www.novell.com/linux/security/advisories/2006_79_kernel.html http://www.securityfocus.com/archive/1/471457 http://w •
CVE-2006-4813
https://notcve.org/view.php?id=CVE-2006-4813
The __block_prepare_write function in fs/buffer.c for Linux kernel 2.6.x before 2.6.13 does not properly clear buffers during certain error conditions, which allows local users to read portions of files that have been unlinked. La función __block_prepare_write en fs/buffer.c para Linux kernel 2.6.x anteriores a 2.6.13 no limpia correctamente los búferes durante ciertas condiciones de error, que permite a usuarios locales leer porciones de ficheros que han sido desvinculados. • http://osvdb.org/31376 http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/23370 http://secunia.com/advisories/23384 http://secunia.com/advisories/23474 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24206 http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=152becd26e0563aefdbc4fd1fe491928efe92d1f http:/ •