CVSS: 7.1EPSS: 0%CPEs: 17EXPL: 1CVE-2011-1476 – SUSE Security Advisory - SUSE-SU-2015:0812-1
https://notcve.org/view.php?id=CVE-2011-1476
25 May 2011 — Integer underflow in the Open Sound System (OSS) subsystem in the Linux kernel before 2.6.39 on unspecified non-x86 platforms allows local users to cause a denial of service (memory corruption) by leveraging write access to /dev/sequencer. Un desbordamiento de entero en el subsistema 'Open Sound System' (OSS) del kernel de Linux en versiones anteriores a v2.6.39 en plataformas no-x86 permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) mediante el aprovechamiento del acceso... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-189: Numeric Errors •
CVSS: 5.7EPSS: 0%CPEs: 1EXPL: 1CVE-2011-1478 – kernel: gro: reset dev and skb_iff on skb reuse
https://notcve.org/view.php?id=CVE-2011-1478
25 May 2011 — The napi_reuse_skb function in net/core/dev.c in the Generic Receive Offload (GRO) implementation in the Linux kernel before 2.6.38 does not reset the values of certain structure members, which might allow remote attackers to cause a denial of service (NULL pointer dereference) via a malformed VLAN frame. La función napi_reuse_skb de net/core/dev.c en la implementación Generic Receive Offload (GRO) en el kernel de Linux anteriores a v2.6.38 no restablece los valores de algunos miembros de la estructura, lo ... • https://packetstorm.news/files/id/105078 • CWE-476: NULL Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 17EXPL: 1CVE-2011-1080 – kernel: ebtables stack infoleak
https://notcve.org/view.php?id=CVE-2011-1080
25 May 2011 — The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line. La función de do_replace en net/bridge/netfilter/ebtables.c en versiones del kernel de Linux anteriores a v2.6.39 no garantiza que un nombre de campo ... • https://packetstorm.news/files/id/105078 • CWE-20: Improper Input Validation •
CVSS: 6.7EPSS: 0%CPEs: 7EXPL: 2CVE-2011-1182 – kernel signal spoofing issue
https://notcve.org/view.php?id=CVE-2011-1182
25 May 2011 — kernel/signal.c in the Linux kernel before 2.6.39 allows local users to spoof the uid and pid of a signal sender via a sigqueueinfo system call. kernel/signal.c en Linux kernel anterior a v2.6.39 permite a usuarios locales falsear el "uid" y el "pid" a través de un envío de señal de una llamada del sistema "sigqueueinfo". The kernel packages contain the Linux kernel, the core of any Linux operating system. This update includes backported fixes for security issues. These issues, except for CVE-2011-1182, onl... • https://packetstorm.news/files/id/105078 •
CVSS: 9.8EPSS: 0%CPEs: 674EXPL: 1CVE-2011-0726 – kernel: proc: protect mm start_code/end_code in /proc/pid/stat
https://notcve.org/view.php?id=CVE-2011-0726
25 May 2011 — The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary. Función do_task_stat en fs/proc/array.c en el kernel de linux antes de v2.6.39-rc1 no realiza una comprobación de uid esperado, lo que hace que sea más fácil para los usuarios locales derrotar a los... • https://packetstorm.news/files/id/105078 • CWE-20: Improper Input Validation •
CVSS: 7.0EPSS: 0%CPEs: 17EXPL: 1CVE-2011-1759 – Ubuntu Security Notice USN-1394-1
https://notcve.org/view.php?id=CVE-2011-1759
25 May 2011 — Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging a race condition. Desbordamiento de entero en la función sys_oabi_semtimedop en arch/arm/kernel/sys_oabi-compat.c en el Kernel de Linux anterior a v2.6.39 en la plataforma ARM, cuando CONFIG_O... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-189: Numeric Errors •
CVSS: 7.5EPSS: 0%CPEs: 21EXPL: 1CVE-2011-1767 – kernel: netns vs proto registration ordering
https://notcve.org/view.php?id=CVE-2011-1767
25 May 2011 — net/ipv4/ip_gre.c in the Linux kernel before 2.6.34, when ip_gre is configured as a module, allows remote attackers to cause a denial of service (OOPS) by sending a packet during module loading. net/ipv4/ip_gre.c del kernel de Linux en versiones anteriores a la 2.6.34, si ip_gre es configurado como módulo, permite a atacantes remotos provocar una denegación de servicio (OOPS) enviando un paquete durante la carga del módulo. It was discovered that the /proc filesystem did not correctly handle permission chan... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 •
CVSS: 5.5EPSS: 0%CPEs: 17EXPL: 1CVE-2011-1078 – kernel: bt sco_conninfo infoleak
https://notcve.org/view.php?id=CVE-2011-1078
25 May 2011 — The sco_sock_getsockopt_old function in net/bluetooth/sco.c in the Linux kernel before 2.6.39 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via the SCO_CONNINFO option. La función sco_sock_getsockopt_old en net/bluetooth/sco.c en el kernel de Linux anteriores a v2.6.39 no inicializa una estructura concreta, lo que permite a usuarios locales obtener información sensible de la de pila memoria del núcleo a través de la opc... • https://packetstorm.news/files/id/105078 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 1CVE-2011-1180 – Ubuntu Security Notice USN-1256-1
https://notcve.org/view.php?id=CVE-2011-1180
25 May 2011 — Multiple stack-based buffer overflows in the iriap_getvaluebyclass_indication function in net/irda/iriap.c in the Linux kernel before 2.6.39 allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging connectivity to an IrDA infrared network and sending a large integer value for a (1) name length or (2) attribute length. Múltiples desbordamientos de búfer en la función iriap_getvaluebyclass_indication en net/irda/iriap.c en el Kernel de Lin... • https://packetstorm.news/files/id/105078 • CWE-787: Out-of-bounds Write •
CVSS: 7.1EPSS: 0%CPEs: 17EXPL: 1CVE-2011-1079 – kernel: bnep device field missing NULL terminator
https://notcve.org/view.php?id=CVE-2011-1079
25 May 2011 — The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a '\0' character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command. La función de bnep_sock_ioctl en net/bluetooth/bnep/sock.c en versiones del kernel de Linux anteriores a v2.6.39 no garantiza que un campo de dispositivo determinado termine... • https://packetstorm.news/files/id/105078 • CWE-20: Improper Input Validation •
