CVE-2012-1090 – kernel: cifs: dentry refcount leak when opening a FIFO on lookup leads to panic on unmount
https://notcve.org/view.php?id=CVE-2012-1090
28 Mar 2012 — The cifs_lookup function in fs/cifs/dir.c in the Linux kernel before 3.2.10 allows local users to cause a denial of service (OOPS) via attempted access to a special file, as demonstrated by a FIFO. La función cifs_lookup en fs/cifs/dir.c en el núcleo de Linux anteriores a v3.2.10 permite a usuarios locales causar una denegación de servicio (OOPS) a través de intentos de acceso a un archivo especial, como lo demuestra un FIFO. • http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html • CWE-20: Improper Input Validation •
CVE-2012-1097 – kernel: regset: Prevent null pointer reference on readonly regsets
https://notcve.org/view.php?id=CVE-2012-1097
28 Mar 2012 — The regset (aka register set) feature in the Linux kernel before 3.2.10 does not properly handle the absence of .get and .set methods, which allows local users to cause a denial of service (NULL pointer dereference) or possibly have unspecified other impact via a (1) PTRACE_GETREGSET or (2) PTRACE_SETREGSET ptrace call. El funcionalidad regset (también conocido como conjunto de registros) en el kernel de Linux antes de v3.2.10 no controla correctamente la ausencia de métodos ."set" y ".get", lo que permite ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c8e252586f8d5de906385d8cf6385fee289a825e • CWE-476: NULL Pointer Dereference •
CVE-2011-4621 – kernel: tight loop and no preemption can cause system stall
https://notcve.org/view.php?id=CVE-2011-4621
07 Mar 2012 — The Linux kernel before 2.6.37 does not properly implement a certain clock-update optimization, which allows local users to cause a denial of service (system hang) via an application that executes code in a loop. El kernel de Linux antes de v2.6.37 no aplica la optimización de una actualización de reloj, lo que permite a usuarios locales provocar una denegación de servicio (bloqueo del sistema) a través de una aplicación que ejecuta código en un bucle. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
CVE-2010-4650
https://notcve.org/view.php?id=CVE-2010-4650
07 Mar 2012 — Buffer overflow in the fuse_do_ioctl function in fs/fuse/file.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service or possibly have unspecified other impact by leveraging the ability to operate a CUSE server. Un desbordamiento de búfer en la función fuse_do_ioctl en fs/fusible/file.c en versiones del kernel de Linux anteriores a v2.6.37 permite a usuarios locales provocar una denegación de servicio o posiblemente tener un impacto no especificado mediante el aprovechamiento de ... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-0006 – kernel: ima: fix add LSM rule bug
https://notcve.org/view.php?id=CVE-2011-0006
07 Mar 2012 — The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator's addition of an IMA rule for LSM. La función ima_lsm_rule_init en security/integrity/ima/ima_policy.c en versiones del kernel de Linux anteriores a v2.6.37, cuando 'Linux Security Modules' (LSM) está desacti... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-0879 – kernel: block: CLONE_IO io_context refcounting issues
https://notcve.org/view.php?id=CVE-2012-0879
07 Mar 2012 — The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. La implementación I/O para dispositivos de bloque en el núcleo de Linux anteriores a v2.6.33 no maneja adecuadamente la característica CLONE_IO, lo cual permite a usuarios locales causar una denegación de servicio (inestabilidad I/O) arrancando múltiples proce... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-4594 – kernel: send(m)msg: user pointer dereferences
https://notcve.org/view.php?id=CVE-2011-4594
06 Mar 2012 — The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. La función __ sys_sendmsg en net/socket.c en el kernel de Linux antes de v3.1 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante el uso de una llamada a la 'system call' sendmmsg debidamente modificada, dando lugar a una eliminación de referencia... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c • CWE-476: NULL Pointer Dereference •
CVE-2012-0045 – Linux Kernel 3.1.8 - KVM Local Denial of Service
https://notcve.org/view.php?id=CVE-2012-0045
06 Mar 2012 — The em_syscall function in arch/x86/kvm/emulate.c in the KVM implementation in the Linux kernel before 3.2.14 does not properly handle the 0f05 (aka syscall) opcode, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application, as demonstrated by an NASM file. La función em_syscall en arch/x86/kvm/emulate.c en la implementación KVM en el kernel de linux anterior a v.3.2.14 no maneja correctamente el opcode 0f05, permitiendo a los clientes usuarios del sistema operativo... • https://www.exploit-db.com/exploits/36545 •
CVE-2011-1759
https://notcve.org/view.php?id=CVE-2011-1759
06 Mar 2012 — Integer overflow in the sys_oabi_semtimedop function in arch/arm/kernel/sys_oabi-compat.c in the Linux kernel before 2.6.39 on the ARM platform, when CONFIG_OABI_COMPAT is enabled, allows local users to gain privileges or cause a denial of service (heap memory corruption) by providing a crafted argument and leveraging a race condition. Desbordamiento de entero en la función sys_oabi_semtimedop en arch/arm/kernel/sys_oabi-compat.c en el Kernel de Linux anterior a v2.6.39 en la plataforma ARM, cuando CONFIG_O... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-189: Numeric Errors •
CVE-2011-2182
https://notcve.org/view.php?id=CVE-2011-2182
06 Mar 2012 — The ldm_frag_add function in fs/partitions/ldm.c in the Linux kernel before 2.6.39.1 does not properly handle memory allocation for non-initial fragments, which might allow local users to conduct buffer overflow attacks, and gain privileges or obtain sensitive information, via a crafted LDM partition table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1017. La función ldm_frag_add de fs/partitions/ldm.c del kernel de Linux en versiones anteriores a la 2.6.39.1 no maneja apropiad... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •