CVE-2006-6128
https://notcve.org/view.php?id=CVE-2006-6128
The ReiserFS functionality in Linux kernel 2.6.18, and possibly other versions, allows local users to cause a denial of service via a malformed ReiserFS file system that triggers memory corruption when a sync is performed. La funcionalidad ReiserFS en Linux kernel 2.6.18, y posiblemente otras versiones, permite a un usuario local provocar denegación de servicio a través de sistemas de archivos manipulados ReiserFS que dispara una corrupción de memoria cuando se lleva a cabo una sincronización. • http://projects.info-pull.com/mokb/MOKB-25-11-2006.html http://secunia.com/advisories/23093 http://www.vupen.com/english/advisories/2006/4716 https://exchange.xforce.ibmcloud.com/vulnerabilities/30551 •
CVE-2006-6057
https://notcve.org/view.php?id=CVE-2006-6057
The Linux kernel 2.6.x up to 2.6.18, and possibly other versions, on Fedora Core 6 and possibly other operating systems, allows local users to cause a denial of service (crash) via a malformed gfs2 file stream that triggers a NULL pointer dereference in the init_journal function. El kernel de Linux 2.6.x hasta to 2.6.18, y posiblemente otras versiones, en Fedora Core 6 y posiblemente otros sistemas operativos, permite a usuarios locales provocar una denegación de servicio (caída) mediante una secuencia de fichero gfs2 mal formado que dispara un referencia a puntero NULL en la función init_journal. • http://projects.info-pull.com/mokb/MOKB-15-11-2006.html http://secunia.com/advisories/22886 http://secunia.com/advisories/24098 http://www.ubuntu.com/usn/usn-416-1 http://www.vupen.com/english/advisories/2006/4556 https://exchange.xforce.ibmcloud.com/vulnerabilities/30307 •
CVE-2006-6054
https://notcve.org/view.php?id=CVE-2006-6054
The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum. El código del sistema de ficheros ext2 en Linux kernel 2.6 permite a usuarios locales provocar una denegación de servicio (caída) mediante una sequencia ext2 con estructuras de datos mal formadas que dispara un error en ext2_check_page debido a una longitud inferior al mínimo. • http://projects.info-pull.com/mokb/MOKB-12-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://rhn.redhat.com/errata/RHSA-2007-0436.html http://secunia.com/advisories/22837 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/25630 http://secunia.com/advisories/25691 http://secunia.com/advisories/26379 http://secunia.com/advisori •
CVE-2006-6053
https://notcve.org/view.php?id=CVE-2006-6053
The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext3 stream with malformed data structures. La función ext3fs_dirhash en el kernel de Linux 2.6.x permite a usuarios locales provocar una denegación de servicio (caída) mediante un flujo (stream) ext3 con estructuras de datos mal formadas. • http://projects.info-pull.com/mokb/MOKB-10-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22776 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24100 http://secunia.com/advisories/24206 http://secunia.com/advisories/24482 http://secunia.com/advisories/25691 http://secunia.com/advisories/25714 http://secunia.com/advisories/29058 http: •
CVE-2006-6058 – minix_bmap denial of service
https://notcve.org/view.php?id=CVE-2006-6058
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. El código del sistema de ficheros minix en el kernel de Linux 2.6.x anterior a 2.6.24 incluyendo 2.6.18, permite a usuarios locales provocar una denegación de servicio (cuelgue) mediante un secuencia de fichero minix que dispara un bucle infinito en la función minix_bmap. NOTA: Esta vulnerabilidad podría deberse a un desbordamiento de entero o error de presencia de signo en entero. • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24 http://projects.info-pull.com/mokb/MOKB-17-11-2006.html http://secunia.com/advisories/23034 http://secunia.com/advisories/26379 http://secunia.com/advisories/27528 http://secunia.com/advisories/27614 http://secunia.com/advisories/27703 http://secunia.com/advisories/28141 http://secunia.com/advisories/28170 http://secunia.com/advisories/28654 http://secunia.com/advisories/28706 http://secunia.com/advisories • CWE-189: Numeric Errors •