CVE-2006-0482
https://notcve.org/view.php?id=CVE-2006-0482
Linux kernel 2.6.15.1 and earlier, when running on SPARC architectures, allows local users to cause a denial of service (hang) via a "date -s" command, which causes invalid sign extended arguments to be provided to the get_compat_timespec function call. El kernel de Linux 2.6.15.1 y versiones anteriores, cuando se ejecuta en arquitecturas SPARC, permite a usuarios locales provocar una denegación de servicio (cuelgue) a través del comando "date-s", lo que provoca argumentos de señal extendida no válidos para ser proporcionados a la llamada a la función get_compat_timespec. • http://lists.debian.org/debian-sparc/2006/01/msg00129.html http://marc.info/?l=linux-sparc&m=113861010514065&w=2 http://marc.info/?l=linux-sparc&m=113861287813463&w=2 http://secunia.com/advisories/19374 http://www.debian.org/security/2006/dsa-1017 http://www.securityfocus.com/bid/17216 http://www.vupen.com/english/advisories/2006/0418 https://exchange.xforce.ibmcloud.com/vulnerabilities/24475 •
CVE-2006-0037
https://notcve.org/view.php?id=CVE-2006-0037
ip_nat_pptp in the PPTP NAT helper (netfilter/ip_nat_helper_pptp.c) in Linux kernel 2.6.14, and other versions, allows local users to cause a denial of service (memory corruption or crash) via a crafted outbound packet that causes an incorrect offset to be calculated from pointer arithmetic when non-linear SKBs (socket buffers) are used. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=03b9feca89366952ae5dfe4ad8107b1ece50b710 http://secunia.com/advisories/18482 http://securityreason.com/securityalert/388 http://www.securityfocus.com/bid/16414 http://www.trustix.org/errata/2006/0004 http://www.vupen.com/english/advisories/2006/0220 https://exchange.xforce.ibmcloud.com/vulnerabilities/24204 •
CVE-2006-0036
https://notcve.org/view.php?id=CVE-2006-0036
ip_nat_pptp in the PPTP NAT helper (netfilter/ip_nat_helper_pptp.c) in Linux kernel 2.6.14, and other versions, allows remote attackers to cause a denial of service (memory corruption or crash) via an inbound PPTP_IN_CALL_REQUEST packet that causes a null pointer to be used in an offset calculation. • http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=15db34702cfafd24acc60295cf14861e497502ab http://secunia.com/advisories/18482 http://securityreason.com/securityalert/388 http://www.securityfocus.com/bid/16414 http://www.trustix.org/errata/2006/0004 http://www.vupen.com/english/advisories/2006/0220 https://exchange.xforce.ibmcloud.com/vulnerabilities/24203 •
CVE-2006-0035
https://notcve.org/view.php?id=CVE-2006-0035
The netlink_rcv_skb function in af_netlink.c in Linux kernel 2.6.14 and 2.6.15 allows local users to cause a denial of service (infinite loop) via a nlmsg_len field of 0. • http://secunia.com/advisories/18482 http://securityreason.com/securityalert/388 http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ad8e4b75c8a7bed475d72ce09bf5267188621961 http://www.securityfocus.com/bid/16414 http://www.trustix.org/errata/2006/0004 http://www.vupen.com/english/advisories/2006/0220 https://exchange.xforce.ibmcloud.com/vulnerabilities/24202 • CWE-399: Resource Management Errors •
CVE-2006-0095
https://notcve.org/view.php?id=CVE-2006-0095
dm-crypt in Linux kernel 2.6.15 and earlier does not clear a structure before it is freed, which leads to a memory disclosure that could allow local users to obtain sensitive information about a cryptographic key. dm-crypt en el kernel de Linux 2.6.15 y versiones anteriores no borra una estructura antes de ser liberada, lo que lleva a una divulgación de memoria que puede permitir a usuarios locales obtener información sensible de una clave criptográfica. • http://marc.info/?l=linux-kernel&m=113640535312572&w=2 http://marc.info/?l=linux-kernel&m=113641114812886&w=2 http://secunia.com/advisories/18487 http://secunia.com/advisories/18527 http://secunia.com/advisories/18774 http://secunia.com/advisories/19160 http://secunia.com/advisories/19374 http://secunia.com/advisories/20398 http://securityreason.com/securityalert/388 http://securitytracker.com/id?1015740 http://www.debian.org/security/2006/dsa-1017 http://www.mandriva •