CVE-2013-2148 – Kernel: fanotify: info leak in copy_event_to_user
https://notcve.org/view.php?id=CVE-2013-2148
07 Jun 2013 — The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor. La función fill_event_metadata en fs/notify/fanotify/fanotify_user.c en Linux kernel hasta v3.9.4 no inicializa determinadas estructuras, lo que permite a atacantes locales obtener información sensible desde la memoria del kernel a tr... • http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-399: Resource Management Errors •
CVE-2011-4604
https://notcve.org/view.php?id=CVE-2011-4604
07 Jun 2013 — The bat_socket_read function in net/batman-adv/icmp_socket.c in the Linux kernel before 3.3 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted batman-adv ICMP packet. La función bat_socket_read en net/batman-adv/icmp_socket.c en el kernel de Linux anterior a v3.3 permite a atacantes remotos causar una denegación de servicio (consumo de memoria) o posiblemente tener otro impacto sin especificar a través de paquetes batman-adv ICMP ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b5a1eeef04cc7859f34dec9b72ea1b28e4aba07c • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-2851 – kernel: block: passing disk names as format strings
https://notcve.org/view.php?id=CVE-2013-2851
07 Jun 2013 — Format string vulnerability in the register_disk function in block/genhd.c in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and writing format string specifiers to /sys/module/md_mod/parameters/new_array in order to create a crafted /dev/md device name. Vulnerabilidad de formato de cadena en la función register_disk en block/genhd.c en Linux kernel hasta v3.9.4 permite a usuarios locales conseguir privilegios haciendo uso de acceso root y la escritura especif... • http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html • CWE-134: Use of Externally-Controlled Format String •
CVE-2013-1929 – Kernel: tg3: buffer overflow in VPD firmware parsing
https://notcve.org/view.php?id=CVE-2013-1929
15 May 2013 — Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via crafted firmware that specifies a long string in the Vital Product Data (VPD) data structure. Desbordamiento de búfer basado en memoria dinámica en la función tg3_read_vpd en drivers/net/ethernet/broadcom/tg3.c en el kernel de Linux anterior a v3.8.3 que permite ... • http://cansecwest.com/slides/2013/PrivateCore%20CSW%202013.pdf • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-2094 – Linux Kernel Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2013-2094
14 May 2013 — The perf_swevent_init function in kernel/events/core.c in the Linux kernel before 3.8.9 uses an incorrect integer data type, which allows local users to gain privileges via a crafted perf_event_open system call. La función perf_swevent_init en kernel/events/core.c en el Kernel de Linux anterior a v3.8.9 usa un tipo de datos entero incorrecto, lo que permite a usuarios locales ganar privilegios mediante una llamada al sistema perf_event_open especialmente diseñada. Linux kernel fails to check all 64 bits of ... • https://www.exploit-db.com/exploits/25444 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •
CVE-2013-2017 – kernel: veth: double-free flaw in case of congestion
https://notcve.org/view.php?id=CVE-2013-2017
03 May 2013 — The veth (aka virtual Ethernet) driver in the Linux kernel before 2.6.34 does not properly manage skbs during congestion, which allows remote attackers to cause a denial of service (system crash) by leveraging lack of skb consumption in conjunction with a double-free error. El driver Veth (también conocido como Ethernet virtual) en el kernel Linux anterior a v2.6.34 no gestiona adecuadamente skbs durante la congestión, lo que permite a atacantes remotos provocar una denegación de servicio (caída del sistema... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 • CWE-399: Resource Management Errors •
CVE-2013-1979 – kernel: net: incorrect SCM_CREDENTIALS passing
https://notcve.org/view.php?id=CVE-2013-1979
02 May 2013 — The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application. La función scm_set_cred en include/net/scm.h en el Kernel de Linux anterior a v3.8.11 usa valores uid y gid incorrectos durante el pase de credenciales, lo que permite a usuarios locales ganar privilegios mediante una aplicación especialmente diseñada • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=83f1b4ba917db5dc5a061a44b3403ddb6e783494 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-1959 – Linux Kernel < 3.8.x - open-time Capability 'file_ns_capable()' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2013-1959
02 May 2013 — kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process. kernel/user_namespace.c en el kernel de Linux anterior a v3.8.9 no tiene los requisitos de capacidades adecuadas para los archivos uid_map y gid_map, lo que permite a usuarios locales obtener privilegios mediante la aper... • https://www.exploit-db.com/exploits/25450 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-2015
https://notcve.org/view.php?id=CVE-2013-2015
29 Apr 2013 — The ext4_orphan_del function in fs/ext4/namei.c in the Linux kernel before 3.7.3 does not properly handle orphan-list entries for non-journal filesystems, which allows physically proximate attackers to cause a denial of service (system hang) via a crafted filesystem on removable media, as demonstrated by the e2fsprogs tests/f_orphan_extents_inode/image.gz test. La funcion ext4_orphan_del en fs/ext4/namei.c en Linux Kernel anterior a v3.7.3 no maneja adecuadamente las cabeceras orphan-list para sistemas de f... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0e9a9a1ad619e7e987815d20262d36a2f95717ca • CWE-399: Resource Management Errors •
CVE-2013-3302
https://notcve.org/view.php?id=CVE-2013-3302
29 Apr 2013 — Race condition in the smb_send_rqst function in fs/cifs/transport.c in the Linux kernel before 3.7.2 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via vectors involving a reconnection event. Condición de carrera en la función smb_send_rqst en fs/CIFS/transport.c en el kernel de Linux antes de v3.7.2 permite a usuarios locales provocar una denegación de servicio (referencia a un puntero NULL y caida) o posiblemente tener otro imp... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ea702b80e0bbb2448e201472127288beb82ca2fe • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •