CVE-2008-3535 – kernel: fix off-by-one error in iov_iter_advance()
https://notcve.org/view.php?id=CVE-2008-3535
08 Aug 2008 — Off-by-one error in the iov_iter_advance function in mm/filemap.c in the Linux kernel before 2.6.27-rc2 allows local users to cause a denial of service (system crash) via a certain sequence of file I/O operations with readv and writev, as demonstrated by testcases/kernel/fs/ftest/ftest03 from the Linux Test Project. Error de superación del límite en la función iov_iter_advance de mm/filemap.c en Linux kernel versiones anteriores a 2.6.27-rc2 permite a usuarios locales provocar una denegación de servicio (ca... • http://mirror.celinuxforum.org/gitstat/commit-detail.php?commit=94ad374a0751f40d25e22e036c37f7263569d24c • CWE-193: Off-by-one Error •
CVE-2008-3272 – kernel snd_seq_oss_synth_make_info leak
https://notcve.org/view.php?id=CVE-2008-3272
08 Aug 2008 — The snd_seq_oss_synth_make_info function in sound/core/seq/oss/seq_oss_synth.c in the sound subsystem in the Linux kernel before 2.6.27-rc2 does not verify that the device number is within the range defined by max_synthdev before returning certain data to the caller, which allows local users to obtain sensitive information. La función snd_seq_oss_synth_make_info de sound/core/seq/oss/seq_oss_synth.c en el subsistema sound de Linux kernel versiones anteriores a 2.6.27-rc2 no verifica que el número de disposi... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=82e68f7ffec3800425f2391c8c86277606860442 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2008-3496
https://notcve.org/view.php?id=CVE-2008-3496
06 Aug 2008 — Buffer overflow in format descriptor parsing in the uvc_parse_format function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the video4linux (V4L) implementation in the Linux kernel before 2.6.26.1 has unknown impact and attack vectors. Desbordamiento de búfer en format descriptor parsing en la función uvc_parse_format de drivers/media/video/uvc/uvc_driver.c en uvcvideo de la implementación video4linux (V4L) de Linux kernel versiones anteriores a 2.6.26.1 tiene un impacto y vectores de ataque descon... • http://lists.opensuse.org/opensuse-security-announce/2008-09/msg00004.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2008-2931 – kernel: missing check before setting mount propagation
https://notcve.org/view.php?id=CVE-2008-2931
09 Jul 2008 — The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint. La función do_change_type en fs/namespace.c del núcleo de Linux en versiones anteriores a 2.6.22 no verifica que la persona que llama tiene la capacidad CAP_SYS_ADMIN, lo cual permite a usuarios locales conseguir privilegios o provocar una denegaci... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=ee6f958291e2a768fd727e7a67badfff0b67711a • CWE-269: Improper Privilege Management •
CVE-2008-3077
https://notcve.org/view.php?id=CVE-2008-3077
09 Jul 2008 — arch/x86/kernel/ptrace.c in the Linux kernel before 2.6.25.10 on the x86_64 platform leaks task_struct references into the sys32_ptrace function, which allows local users to cause a denial of service (system crash) or have unspecified other impact via unknown vectors, possibly a use-after-free vulnerability. arch/x86/kernel/ptrace.c en el núcleo de Linux anterior a 2.6.25.10 para plataformas x86_64, filtra referencias task_struct en la función sys32_ptrace, esto permita a usuarios locales provocar una deneg... • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=1e9a615bfce7996ea4d815d45d364b47ac6a74e8 • CWE-416: Use After Free •
CVE-2008-2812 – kernel: NULL ptr dereference in multiple network drivers due to missing checks in tty code
https://notcve.org/view.php?id=CVE-2008-2812
09 Jul 2008 — The Linux kernel before 2.6.25.10 does not properly perform tty operations, which allows local users to cause a denial of service (system crash) or possibly gain privileges via vectors involving NULL pointer dereference of function pointers in (1) hamradio/6pack.c, (2) hamradio/mkiss.c, (3) irda/irtty-sir.c, (4) ppp_async.c, (5) ppp_synctty.c, (6) slip.c, (7) wan/x25_asy.c, and (8) wireless/strip.c in drivers/net/. El núcleo de Linux anterior a 2.6.25.10, no realiza de forma adecuada las operaciones tty, es... • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commitdiff%3Bh=2a739dd53ad7ee010ae6e155438507f329dce788 • CWE-476: NULL Pointer Dereference •
CVE-2008-2826 – kernel: sctp: sctp_getsockopt_local_addrs_old() potential overflow
https://notcve.org/view.php?id=CVE-2008-2826
02 Jul 2008 — Integer overflow in the sctp_getsockopt_local_addrs_old function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) functionality in the Linux kernel before 2.6.25.9 allows local users to cause a denial of service (resource consumption and system outage) via vectors involving a large addr_num field in an sctp_getaddrs_old data structure. Desbordamiento de entero en la función sctp_getsockopt_local_addrs_old de net/sctp/socket.c en la funcionalidad Stream Control Transmission Protocol (s... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=735ce972fbc8a65fb17788debd7bbe7b4383cc62 • CWE-190: Integer Overflow or Wraparound •
CVE-2008-2729 – kernel: [x86_64] The string instruction version didn't zero the output on exception.
https://notcve.org/view.php?id=CVE-2008-2729
30 Jun 2008 — arch/x86_64/lib/copy_user.S in the Linux kernel before 2.6.19 on some AMD64 systems does not erase destination memory locations after an exception during kernel memory copy, which allows local users to obtain sensitive information. arch/x86_64/lib/copy_user.S en el kernel de Linux anterior a 2.6.19 en algunos sistemas AMD64 no borra las posiciones de memoria de destino después de una excepción, durante la copia de memoria del kernel, lo que permite a usuarios locales obtener información sensible. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=3022d734a54cbd2b65eea9a024564821101b4a9a%3Bhp=f0f4c3432e5e1087b3a8c0e6bd4113d3c37497ff • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2008-0598 – kernel: linux x86_64 ia32 emulation leaks uninitialized data
https://notcve.org/view.php?id=CVE-2008-0598
30 Jun 2008 — Unspecified vulnerability in the 32-bit and 64-bit emulation in the Linux kernel 2.6.9, 2.6.18, and probably other versions allows local users to read uninitialized memory via unknown vectors involving a crafted binary. Vulnerabilidad no especificada en el emulador 32-bit y 64-bit del núcleo de Linux 2.6.9, 2.6.18, y posiblemente otras versiones permite a usuarios locales leer memoria sin inicializar a través de vectores desconocidos involucrados en un binario manipulado. • http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00000.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2008-2944
https://notcve.org/view.php?id=CVE-2008-2944
30 Jun 2008 — Double free vulnerability in the utrace support in the Linux kernel, probably 2.6.18, in Red Hat Enterprise Linux (RHEL) 5 and Fedora Core 6 (FC6) allows local users to cause a denial of service (oops), as demonstrated by a crash when running the GNU GDB testsuite, a different vulnerability than CVE-2008-2365. Vulnerabilidad de doble liberación en el soporte utrace del núcleo de Linux, probablemente de 2.6.18, en Red Hat Enterprise Linux (RHEL) 5 y Fedora Core 6 (FC6) permite a usuarios locales provocar una... • https://bugzilla.redhat.com/show_bug.cgi?id=207002 • CWE-415: Double Free •