CVE-2011-4081 – kernel: crypto: ghash: null pointer deref if no key is set
https://notcve.org/view.php?id=CVE-2011-4081
24 May 2012 — crypto/ghash-generic.c in the Linux kernel before 3.1 allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact by triggering a failed or missing ghash_setkey function call, followed by a (1) ghash_update function call or (2) ghash_final function call, as demonstrated by a write operation on an AF_ALG socket. crypto/ghash-generic.c en el kernel de Linux antes de v3.1 permite a usuarios locales causar una denegación de servicio (desreferenci... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7ed47b7d142ec99ad6880bbbec51e9f12b3af74c • CWE-476: NULL Pointer Dereference •
CVE-2011-3359 – kernel: b43: allocate receive buffers big enough for max frame len + offset
https://notcve.org/view.php?id=CVE-2011-3359
24 May 2012 — The dma_rx function in drivers/net/wireless/b43/dma.c in the Linux kernel before 2.6.39 does not properly allocate receive buffers, which allows remote attackers to cause a denial of service (system crash) via a crafted frame. La función de dma_rx drivers/net/wireless/b43/dma.c en el kernel de Linux antes de 2.6.39 no asigna correctamente los búferes de recepción, lo que permite a atacantes remotos provocar una denegación de servicio (caída del sistema) a través de un marco diseñado. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-2521 – kernel: perf, x86: fix Intel fixed counters base initialization
https://notcve.org/view.php?id=CVE-2011-2521
24 May 2012 — The x86_assign_hw_event function in arch/x86/kernel/cpu/perf_event.c in the Performance Events subsystem in the Linux kernel before 2.6.39 does not properly calculate counter values, which allows local users to cause a denial of service (panic) via the perf program. La función x86_assign_hw_event de arch/x86/kernel/cpu/perf_event.c en el rendimiento del subsistema de eventos en el kernel de Linux antes de 2.6.39 no calcula correctamente los valores de contador, lo que permite a usuarios locales causar una d... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-189: Numeric Errors •
CVE-2011-3188 – kernel: net: improve sequence number generation
https://notcve.org/view.php?id=CVE-2011-3188
24 May 2012 — The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. Las implementaciones de (1) IPv4 y (2) IPv6 en el kernel de Linux antes de v3.1 utiliza una versión modificada de algoritmo MD4 para generar números de secuencia y val... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec •
CVE-2011-3353 – kernel: fuse: check size of FUSE_NOTIFY_INVAL_ENTRY message
https://notcve.org/view.php?id=CVE-2011-3353
24 May 2012 — Buffer overflow in the fuse_notify_inval_entry function in fs/fuse/dev.c in the Linux kernel before 3.1 allows local users to cause a denial of service (BUG_ON and system crash) by leveraging the ability to mount a FUSE filesystem. Desbordamiento de búfer en la función fuse_notify_inval_entry function in fs/fuse/dev.c en el kernel de Linux antes de v3.1 permite a usuarios locales causar una denegación de servicio (BUG_ON y caída del sistema) mediante el aprovechamiento de la capacidad de montar un sistema d... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c2183d1e9b3f313dd8ba2b1b0197c8d9fb86a7ae • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2011-2699 – kernel: ipv6: make fragment identifications less predictable
https://notcve.org/view.php?id=CVE-2011-2699
24 May 2012 — The IPv6 implementation in the Linux kernel before 3.1 does not generate Fragment Identification values separately for each destination, which makes it easier for remote attackers to cause a denial of service (disrupted networking) by predicting these values and sending crafted packets. La implementación de IPv6 en el kernel de Linux antes de v3.1 no genera valores de los fragmentos de identificación por separado para cada destino, lo que hace que sea más fácil para los atacantes remotos causar una denegaci... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=87c48fa3b4630905f98268dde838ee43626a060c •
CVE-2011-2918 – Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service
https://notcve.org/view.php?id=CVE-2011-2918
24 May 2012 — The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application. El subsistema Performance Events en el kernel de Linux antes de v3.1 no trata correctamente los desbordamientos de eventos asociados con eventos PERF_COUNT_SW_CPU_CLOCK, lo que permite a usuarios locales causar una denegación de servicio (bloqueo del sistema) a tr... • https://www.exploit-db.com/exploits/17769 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-2898 – kernel: af_packet: infoleak
https://notcve.org/view.php?id=CVE-2011-2898
24 May 2012 — net/packet/af_packet.c in the Linux kernel before 2.6.39.3 does not properly restrict user-space access to certain packet data structures associated with VLAN Tag Control Information, which allows local users to obtain potentially sensitive information via a crafted application. net/packet/af_packet.c en el kernel de Linux antes de v2.6.39.3 no restringe adecuadamente el acceso al espacio de usuario a ciertas estructuras de paquetes de datos asociados VLAN Tag Control Information, lo que permite a usuarios ... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.3 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-2707
https://notcve.org/view.php?id=CVE-2011-2707
24 May 2012 — The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request. La función ptrace_setxregs en ??arch/xtensa/kernel/ptrace.c en el kernel de Linux antes de v3.1 no valida los punteros de espacio de usuario, lo que permite a usuarios locales obtener información sensible de las posiciones de memoria del kernel a través de... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d0138ebe24b94065580bd2601f8bb7eb6152f56 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2011-4080 – kernel: sysctl: restrict write access to dmesg_restrict
https://notcve.org/view.php?id=CVE-2011-4080
24 May 2012 — The sysrq_sysctl_handler function in kernel/sysctl.c in the Linux kernel before 2.6.39 does not require the CAP_SYS_ADMIN capability to modify the dmesg_restrict value, which allows local users to bypass intended access restrictions and read the kernel ring buffer by leveraging root privileges, as demonstrated by a root user in a Linux Containers (aka LXC) environment. La función sysrq_sysctl_handler en kernel/sysctl.c en el kernel de Linux antes de v2.6.39 no requiere la capacidad de CAP_SYS_ADMIN para mod... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 • CWE-264: Permissions, Privileges, and Access Controls •