CVE-2006-0039
https://notcve.org/view.php?id=CVE-2006-0039
Race condition in the do_add_counters function in netfilter for Linux kernel 2.6.16 allows local users with CAP_NET_ADMIN capabilities to read kernel memory by triggering the race condition in a way that produces a size value that is inconsistent with allocated memory, which leads to a buffer over-read in IPT_ENTRY_ITERATE. • http://bugs.gentoo.org/show_bug.cgi?id=133465 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17 http://secunia.com/advisories/20185 http://secunia.com/advisories/20671 http://secunia.com/advisories/20914 http://secunia.com/advisories/20991 http://secunia.com/advisories/21476 http://secunia.com/advisories/22292 http://secunia.com/advisories/22945 http://support.avaya.com/elmodocs2/security/ASA-2006-249.htm http://www.debian.org/security/2006/dsa-1097 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2006-1855
https://notcve.org/view.php?id=CVE-2006-1855
choose_new_parent in Linux kernel before 2.6.11.12 includes certain debugging code, which allows local users to cause a denial of service (panic) by causing certain circumstances involving termination of a parent process. • http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21179 http://secunia.com/advisories/21745 http://secunia.com/advisories/22093 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.debian.org/security/2006/dsa-1184 http://www.novell.com/linux/security/advisories/2006_42_kernel.html http://www.redhat.com/support/errata/RHSA-2006-0493.html http://www.securityfocus.com/bid/18099 http://www.ubuntu.com •
CVE-2006-1528
https://notcve.org/view.php?id=CVE-2006-1528
Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ http://marc.info/?l=linux-scsi&m=112540053711489&w=2 http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21555 http://secunia.com/advisories/21745 http://secunia.com/advisories/ • CWE-20: Improper Input Validation •
CVE-2006-1860
https://notcve.org/view.php?id=CVE-2006-1860
lease_init in fs/locks.c in Linux kernel before 2.6.16.16 allows attackers to cause a denial of service (fcntl_setlease lockup) via actions that cause lease_init to free a lock that might not have been allocated on the stack. • http://secunia.com/advisories/20083 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=blobdiff%3Bh=aa7f66091823dde953e15895dc427615701c39c7%3Bhp=e75ac392a313f3fad823bf2e46a03f29701e3e34%3Bhb=1f0e637c94a9b041833947c79110d6c02fff8618%3Bf=fs/locks.c http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1f0e637c94a9b041833947c79110d6c02fff8618 http://www.k •
CVE-2006-1859
https://notcve.org/view.php?id=CVE-2006-1859
Memory leak in __setlease in fs/locks.c in Linux kernel before 2.6.16.16 allows attackers to cause a denial of service (memory consumption) via unspecified actions related to an "uninitialised return value," aka "slab leak." • http://secunia.com/advisories/20083 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=blobdiff%3Bh=aa7f66091823dde953e15895dc427615701c39c7%3Bhp=e75ac392a313f3fad823bf2e46a03f29701e3e34%3Bhb=1f0e637c94a9b041833947c79110d6c02fff8618%3Bf=fs/locks.c http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1f0e637c94a9b041833947c79110d6c02fff8618 http://www.m •