CVE-2006-6060
https://notcve.org/view.php?id=CVE-2006-6060
The NTFS filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly other versions, allows local users to cause a denial of service (CPU consumption) via a malformed NTFS file stream that triggers an infinite loop in the __find_get_block_slow function. El código del sistema de ficheros NTFS en el núcleo de Linux 2.6.x hasta 2.6.18, y posiblemente otras versiones, permite a usuarios locales provocar una denegación de servicio (consumo de la CPU) mediante un flujo (stream) fichero NTFS mal formado que dispara un bucle infinito en la función __find_get_block_slow. • http://projects.info-pull.com/mokb/MOKB-19-11-2006.html http://secunia.com/advisories/23474 http://secunia.com/advisories/25691 http://secunia.com/advisories/25714 http://www.debian.org/security/2007/dsa-1304 http://www.novell.com/linux/security/advisories/2006_79_kernel.html http://www.securityfocus.com/archive/1/471457 https://exchange.xforce.ibmcloud.com/vulnerabilities/30418 •
CVE-2006-6056
https://notcve.org/view.php?id=CVE-2006-6056
Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image. El núcleo de Linux 2.6.x hasta 2.6.18 y posiblemente otras versiones, cuando los ganchos (hooks) de SELinux están habilitados, permite a usuarios locales provocar una denegación de servicio (caída) mediante un flujo (stream) de fichero mal formado que dispara una referencia a un puntero nulo en la función superblock_doinit, como ha sido demostrado usando una imagen del sistema de fichero HFS. • http://projects.info-pull.com/mokb/MOKB-14-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22887 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/24482 http://secunia.com/advisories/24777 http://secunia.com/advisories/25691 http://secunia.com/advisories/25714 http://support.avaya.com/elmodocs2/security •
CVE-2006-5823
https://notcve.org/view.php?id=CVE-2006-5823
The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via a malformed filesystem that uses zlib compression that triggers memory corruption, as demonstrated using cramfs. La función zlib_inflate en el núcleo de Linux 2.6.x permite a usuarios locales provocar una denegación de servicio (caída) mediante un sistema de ficheros mal formado que utiliza compresión zlib que provoca una corrupción de memoria, como se ha demostrado utilizando cramfs. • http://projects.info-pull.com/mokb/MOKB-07-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://rhn.redhat.com/errata/RHSA-2007-0436.html http://secunia.com/advisories/22767 http://secunia.com/advisories/23474 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/24259 http://secunia.com/advisories/24482 http://secunia.com/advisories/25630 http://secunia.com/advisori •
CVE-2006-4572
https://notcve.org/view.php?id=CVE-2006-4572
ip6_tables in netfilter in the Linux kernel before 2.6.16.31 allows remote attackers to (1) bypass a rule that disallows a protocol, via a packet with the protocol header not located immediately after the fragment header, aka "ip6_tables protocol bypass bug;" and (2) bypass a rule that looks for a certain extension header, via a packet with an extension header outside the first fragment, aka "ip6_tables extension header bypass bug." ip6_tables en netfilter en el núcleo de Linux anterior a 2.6.16.31 permite a atacantes remotos (1) evitar una regla que prohíbe un protocolo, mediante un paquete con la cabecera de protocolo no situada inmediatamente tras la cabecera del fragmento, también conocido como "error de evitación de protocolo en ip6_tables"; y (2) evitar una regla que busca una determinada cabecera de extensión, mediante un paquete con una cabecera extendida fuera del primer fragmento, también conocido como "error de evitación de cabecera extendida en ip6_tables" • http://readlist.com/lists/vger.kernel.org/linux-kernel/55/275979.html http://secunia.com/advisories/22731 http://secunia.com/advisories/22762 http://secunia.com/advisories/23384 http://secunia.com/advisories/23474 http://secunia.com/advisories/24098 http://secunia.com/advisories/25691 http://www.kernel.org/git/?p=linux%2Fkernel%2Fgit%2Fstable%2Flinux-2.6.16.y.git&a=search&s=CVE-2006-4572 http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.gi • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2006-5757 – Linux Kernel 2.6.x - 'ISO9660' Denial of Service
https://notcve.org/view.php?id=CVE-2006-5757
Race condition in the __find_get_block_slow function in the ISO9660 filesystem in Linux 2.6.18 and possibly other versions allows local users to cause a denial of service (infinite loop) by mounting a crafted ISO9660 filesystem containing malformed data structures. Condición de carrera en la función __find_get_block_slow en el sistema de ficheros ISO9660 en Linux 2.6.18 y posiblemente otras versiones permite a usuarios locales provocar una denegación de servicio (bucle infinito) montando un sistema de fisheros ISO9660 manipulado que contiene estructuras de datos mal formadas. • https://www.exploit-db.com/exploits/28912 http://projects.info-pull.com/mokb/MOKB-05-11-2006.html http://rhn.redhat.com/errata/RHSA-2007-0014.html http://secunia.com/advisories/22702 http://secunia.com/advisories/22746 http://secunia.com/advisories/23474 http://secunia.com/advisories/23593 http://secunia.com/advisories/23752 http://secunia.com/advisories/23997 http://secunia.com/advisories/24098 http://secunia.com/advisories/24206 http://secunia.com/advisories/25691 • CWE-17: DEPRECATED: Code CWE-399: Resource Management Errors •