CVE-2009-1046 – Linux Kernel 2.6.24_16-23/2.6.27_7-10/2.6.28.3 (Ubuntu 8.04/8.10 / Fedora Core 10 x86-64) - 'set_selection()' UTF-8 Off-by-One Privilege Escalation
https://notcve.org/view.php?id=CVE-2009-1046
23 Mar 2009 — The console selection feature in the Linux kernel 2.6.28 before 2.6.28.4, 2.6.25, and possibly earlier versions, when the UTF-8 console is used, allows physically proximate attackers to cause a denial of service (memory corruption) by selecting a small number of 3-byte UTF-8 characters, which triggers an "off-by-two memory error." NOTE: it is not clear whether this issue crosses privilege boundaries. La funcionalidad de selección de consola en el kernel de Linux 2.6.28 en versiones anteriores a 2.6.28.4, 2.... • https://www.exploit-db.com/exploits/9083 • CWE-399: Resource Management Errors •
CVE-2009-0935
https://notcve.org/view.php?id=CVE-2009-0935
18 Mar 2009 — The inotify_read function in the Linux kernel 2.6.27 to 2.6.27.13, 2.6.28 to 2.6.28.2, and 2.6.29-rc3 allows local users to cause a denial of service (OOPS) via a read with an invalid address to an inotify instance, which causes the device's event list mutex to be unlocked twice and prevents proper synchronization of a data structure for the inotify instance. La función inotify_read en el kernel de Linux versiones 2.6.27 hasta 2.6.27.13, 2.6.28 hasta 2.6.28.2 y 2.6.29-rc3, permite a los usuarios locales cau... • http://marc.info/?l=linux-kernel&m=123337123501681&w=2 • CWE-667: Improper Locking •
CVE-2009-0778 – kernel: rt_cache leak leads to lack of network connectivity
https://notcve.org/view.php?id=CVE-2009-0778
12 Mar 2009 — The icmp_send function in net/ipv4/icmp.c in the Linux kernel before 2.6.25, when configured as a router with a REJECT route, does not properly manage the Protocol Independent Destination Cache (aka DST) in some situations involving transmission of an ICMP Host Unreachable message, which allows remote attackers to cause a denial of service (connectivity outage) by sending a large series of packets to many destination IP addresses within this REJECT route, related to an "rt_cache leak." La función icmp_send ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7c0ecc4c4f8fd90988aab8a95297b9c0038b6160 • CWE-400: Uncontrolled Resource Consumption •
CVE-2009-0859
https://notcve.org/view.php?id=CVE-2009-0859
09 Mar 2009 — The shm_get_stat function in ipc/shm.c in the shm subsystem in the Linux kernel before 2.6.28.5, when CONFIG_SHMEM is disabled, misinterprets the data type of an inode, which allows local users to cause a denial of service (system hang) via an SHM_INFO shmctl call, as demonstrated by running the ipcs program. La función shm_get_stat en ipc/shm.c del subsistema shm en el Kernell de Linux anteriores a v2.6.28.5, cuando CONFIG_SHMEM está desactivado, interpreta de forma errónea el tipo de datos en un inode, lo... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a68e61e8ff2d46327a37b69056998b47745db6fa • CWE-20: Improper Input Validation •
CVE-2009-0834 – kernel: x86-64: syscall-audit: 32/64 syscall hole
https://notcve.org/view.php?id=CVE-2009-0834
06 Mar 2009 — The audit_syscall_entry function in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass certain syscall audit configurations via crafted syscalls, a related issue to CVE-2009-0342 and CVE-2009-0343. La función audit_syscall_entry en el núcleo de Linux v2.6.28.7 y versiones anteriores en la plataforma x86_64 no maneja adecuadamente (1) un proceso d... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ccbe495caa5e604b04d5a31d7459a6f6a76a756c •
CVE-2009-0835 – Linux Kernel 2.6.x - 'seccomp' System Call Security Bypass
https://notcve.org/view.php?id=CVE-2009-0835
06 Mar 2009 — The __secure_computing function in kernel/seccomp.c in the seccomp subsystem in the Linux kernel 2.6.28.7 and earlier on the x86_64 platform, when CONFIG_SECCOMP is enabled, does not properly handle (1) a 32-bit process making a 64-bit syscall or (2) a 64-bit process making a 32-bit syscall, which allows local users to bypass intended access restrictions via crafted syscalls that are misinterpreted as (a) stat or (b) chmod, a related issue to CVE-2009-0342 and CVE-2009-0343. La función __secure_computing en... • https://www.exploit-db.com/exploits/32829 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2009-0748 – kernel: ext4: ext4_fill_super() missing validation issue
https://notcve.org/view.php?id=CVE-2009-0748
27 Feb 2009 — The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem. La superfunción ext4_fill_super en fs/ext4/super.c del kernel Linux v2.6.27 anteriores a v2.6.27.19 y v2.6.28 anteriores a v2.6.28.7 no valida la configuración de superbloque, lo que permite a usuarios loc... • http://bugzilla.kernel.org/show_bug.cgi?id=12371 • CWE-20: Improper Input Validation •
CVE-2009-0745 – kernel: ext4: ext4_group_add() missing initialisation issue
https://notcve.org/view.php?id=CVE-2009-0745
27 Feb 2009 — The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory. La función ext4_group_add en fs/ext4/resize.c en el kernel de Linux v2.6.27 anteriores a v2.6.27.19 y v2.6.28 anteriores a v2.6.28.7 no inicializa de forma adecuada el... • http://bugzilla.kernel.org/show_bug.cgi?id=12433 • CWE-20: Improper Input Validation •
CVE-2009-0747 – kernel: ext4: ext4_isize() denial of service
https://notcve.org/view.php?id=CVE-2009-0747
27 Feb 2009 — The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem. La función ext4_isize en fs/ext4/ext4.h del kernel de Linux v2.6.27 anteriores a v2.6.27.19 y v2.6.28 anteriores a v2.6.28.7 utiliza el componente de la estructura i_si... • http://bugzilla.kernel.org/show_bug.cgi?id=12375 • CWE-399: Resource Management Errors •
CVE-2009-0746 – Linux Kernel 2.6.x - 'make_indexed_dir()' Local Denial of Service
https://notcve.org/view.php?id=CVE-2009-0746
27 Feb 2009 — The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem. La función make_indexed_dir en fs/ext4/namei.c en el kernel de Linux v2.6.27 anteriores a v2.6.27.19 y v2.6.28 anteriores a v2.6.28.7 no valida el campo rec_len, lo que permite a usuarios locales provocar una denegación de servicio (OOPS ... • https://www.exploit-db.com/exploits/32775 • CWE-20: Improper Input Validation •