CVE-2010-0291 – kernel: untangle the do_mremap()
https://notcve.org/view.php?id=CVE-2010-0291
15 Feb 2010 — The Linux kernel before 2.6.32.4 allows local users to gain privileges or cause a denial of service (panic) by calling the (1) mmap or (2) mremap function, aka the "do_mremap() mess" or "mremap/mmap mess." El kernel de Linux en versiones anteriores a la v2.6.32.4 permite a usuarios locales obtener privilegios o provocar una denegación de servicio (panic) llamando a la función (1) mmap o (2) mremap, también conocido como el "do_mremap() mess" o el "mremap/mmap mess." • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0067bd8a55862ac9dd212bd1c4f6f5bff1ca1301 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2010-0298 – kvm: emulator privilege escalation
https://notcve.org/view.php?id=CVE-2010-0298
12 Feb 2010 — The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code, which allows guest OS users to cause a denial of service (guest OS crash) or gain privileges on the guest OS by leveraging access to a (1) IO port or (2) MMIO region, a related issue to CVE-2010-0306. El emulador x86 en KVM3, no usa Current Privilege Level (CPL) e I/O Privilege Level (IOPL) para para determinar el acceso a memoria disponible para e... • http://secunia.com/advisories/38492 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-3556 – kernel: qla2xxx NPIV vport management pseudofiles are world writable
https://notcve.org/view.php?id=CVE-2009-3556
27 Jan 2010 — A certain Red Hat configuration step for the qla2xxx driver in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5, when N_Port ID Virtualization (NPIV) hardware is used, sets world-writable permissions for the (1) vport_create and (2) vport_delete files under /sys/class/scsi_host/, which allows local users to make arbitrary changes to SCSI host attributes by modifying these files. Un paso en la configuración para el controlador qla2xxx sobre el Kernel 2.6.18 en Red Hat Enterprise Linux (RHEL) 5, c... • http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00007.html • CWE-264: Permissions, Privileges, and Access Controls CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2009-4272 – kernel: emergency route cache flushing leads to node deadlock
https://notcve.org/view.php?id=CVE-2009-4272
27 Jan 2010 — A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "emergency" in which a hash chain is too long. NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic. Cierto parche de Red Hat para net/ip... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=73e42897e8e5619eacb787d2ce69be12f47cfc21 • CWE-476: NULL Pointer Dereference CWE-667: Improper Locking •
CVE-2010-0006
https://notcve.org/view.php?id=CVE-2010-0006
26 Jan 2010 — The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.32.4, when network namespaces are enabled, allows remote attackers to cause a denial of service (NULL pointer dereference) via an invalid IPv6 jumbogram, a related issue to CVE-2007-4567. La función ipv6_hop_jumbo en net/ipv6/exthdrs.c en el kernel de Linux en versiones anteriores a 2.6.32.4, cuando los espacios de nombres de red están activados, permite a atacantes remotos producir una denegación de servicio (desreferencia a u... • http://bugs.gentoo.org/show_bug.cgi?id=300951 • CWE-476: NULL Pointer Dereference •
CVE-2010-0003 – kernel: infoleak if print-fatal-signals=1
https://notcve.org/view.php?id=CVE-2010-0003
26 Jan 2010 — The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address. La función print_fatal_signal en kernel/signal.c en el kernel de Linux en versiones anteriores a v2.6.32.4 en plataformas i386, ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b45c6e76bc2c72f6426c14bed64fdcbc9bf37cb0 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2010-0007 – kernel: netfilter: ebtables: enforce CAP_NET_ADMIN
https://notcve.org/view.php?id=CVE-2010-0007
19 Jan 2010 — net/bridge/netfilter/ebtables.c in the ebtables module in the netfilter framework in the Linux kernel before 2.6.33-rc4 does not require the CAP_NET_ADMIN capability for setting or modifying rules, which allows local users to bypass intended access restrictions and configure arbitrary network-traffic filtering via a modified ebtables application. net/bridge/netfilter/ebtables.c en el módulo ebtables en netfilter framework en el kernel de Linux anterior a v2.6.33-rc4 no requiere de la capacidad CAP_NET_ADMIN... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dce766af541f6605fa9889892c0280bab31c66ab • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-4141 – Linux Kernel < 2.6.28 - 'fasync_helper()' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-4141
19 Jan 2010 — Use-after-free vulnerability in the fasync_helper function in fs/fcntl.c in the Linux kernel before 2.6.33-rc4-git1 allows local users to gain privileges via vectors that include enabling O_ASYNC (aka FASYNC or FIOASYNC) on a locked file, and then closing this file. Vulnerabilidad de uso anterior a la liberación en la función fasync_helper en fs/fcntl.c en el kernel de Linux anterior a v2.6.33 permite a usuarios locales obtener privilegios a través de vectores que incluyen habilitado O_ASYNC (también conoci... • https://www.exploit-db.com/exploits/33523 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-399: Resource Management Errors •
CVE-2009-4538 – kernel: e1000e frame fragment issue
https://notcve.org/view.php?id=CVE-2009-4538
12 Jan 2010 — drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a related issue to CVE-2009-4537. drivers/net/e1000e/netdev.c en el driver e1000e en el kernel de Linux v2.6.32.3 y anteriores no comprueba adecuadamente el tamaño de una trama Ethernet que excede el MTU, lo que permite a atacantes remotos conseguir un impacto desc... • http://lists.fedoraproject.org/pipermail/package-announce/2010-February/035159.html •
CVE-2009-4536 – kernel: e1000 issue reported at 26c3
https://notcve.org/view.php?id=CVE-2009-4536
12 Jan 2010 — drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385. drivers/net/e1000/e1000_main.c en el driver e1000 en el kernel de Linux v2.6.32.3 y anteriores gestiona tramas Ethernet que... • http://blog.c22.cc/2009/12/27/26c3-cat-procsysnetipv4fuckups • CWE-189: Numeric Errors •