CVE-2006-1528
https://notcve.org/view.php?id=CVE-2006-1528
Linux kernel before 2.6.13 allows local users to cause a denial of service (crash) via a dio transfer from the sg driver to memory mapped (mmap) IO space. El kernel de Linux en versiones anteriores a 2.6.13 permite a usuarios locales provocar una denegación de servicio (caída) a través de una transferencia dio desde el controlador sg al espacio de memoria asignada (mmap) IO. • http://kernel.org/pub/linux/kernel/v2.4/ChangeLog-2.4.33.1 http://linux.bkbits.net:8080/linux-2.6/cset%4043220081yu9ClBQNuqSSnW_9amW7iQ http://marc.info/?l=linux-scsi&m=112540053711489&w=2 http://secunia.com/advisories/20237 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://secunia.com/advisories/21498 http://secunia.com/advisories/21555 http://secunia.com/advisories/21745 http://secunia.com/advisories/ • CWE-20: Improper Input Validation •
CVE-2006-1860
https://notcve.org/view.php?id=CVE-2006-1860
lease_init in fs/locks.c in Linux kernel before 2.6.16.16 allows attackers to cause a denial of service (fcntl_setlease lockup) via actions that cause lease_init to free a lock that might not have been allocated on the stack. • http://secunia.com/advisories/20083 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=blobdiff%3Bh=aa7f66091823dde953e15895dc427615701c39c7%3Bhp=e75ac392a313f3fad823bf2e46a03f29701e3e34%3Bhb=1f0e637c94a9b041833947c79110d6c02fff8618%3Bf=fs/locks.c http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1f0e637c94a9b041833947c79110d6c02fff8618 http://www.k •
CVE-2006-1859
https://notcve.org/view.php?id=CVE-2006-1859
Memory leak in __setlease in fs/locks.c in Linux kernel before 2.6.16.16 allows attackers to cause a denial of service (memory consumption) via unspecified actions related to an "uninitialised return value," aka "slab leak." • http://secunia.com/advisories/20083 http://secunia.com/advisories/20716 http://secunia.com/advisories/21045 http://secunia.com/advisories/21179 http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=blobdiff%3Bh=aa7f66091823dde953e15895dc427615701c39c7%3Bhp=e75ac392a313f3fad823bf2e46a03f29701e3e34%3Bhb=1f0e637c94a9b041833947c79110d6c02fff8618%3Bf=fs/locks.c http://www.kernel.org/git/?p=linux/kernel/git/stable/linux-2.6.16.y.git%3Ba=commit%3Bh=1f0e637c94a9b041833947c79110d6c02fff8618 http://www.m •
CVE-2006-1052
https://notcve.org/view.php?id=CVE-2006-1052
The selinux_ptrace logic in hooks.c in SELinux for Linux 2.6.6 allows local users with ptrace permissions to change the tracer SID to an SID of another process. La lógica selinux_ptrace en hooks.c en SELinux para Linux 2.6.6 permite a usuarios locales con permisos ptrace cambiar el trazador SID a un SID de otro proceso. • http://marc.info/?l=git-commits-head&m=114210002712363&w=2 http://marc.info/?l=selinux&m=114226465106131&w=2 http://secunia.com/advisories/19955 http://secunia.com/advisories/20157 http://secunia.com/advisories/21465 http://secunia.com/advisories/22093 http://secunia.com/advisories/22417 http://selinuxnews.org/wp/index.php/2006/03/13/security-ptrace-bug-cve-2006-1052 http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm http://www.debian.org/security/2006 •
CVE-2006-1527
https://notcve.org/view.php?id=CVE-2006-1527
The SCTP-netfilter code in Linux kernel before 2.6.16.13 allows remote attackers to trigger a denial of service (infinite loop) via unknown vectors that cause an invalid SCTP chunk size to be processed by the for_each_sctp_chunk function. • http://secunia.com/advisories/19926 http://secunia.com/advisories/20157 http://secunia.com/advisories/20237 http://secunia.com/advisories/20398 http://secunia.com/advisories/20716 http://secunia.com/advisories/21745 http://support.avaya.com/elmodocs2/security/ASA-2006-161.htm http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.13 http://www.mandriva.com/security/advisories?name=MDKSA-2006:086 http://www.novell.com/linux/security/advisories/2006-05-31.html http& •