CVE-2007-4567 – Linux Kernel 2.6.22 - IPv6 Hop-By-Hop Header Remote Denial of Service
https://notcve.org/view.php?id=CVE-2007-4567
21 Dec 2007 — The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic) via a crafted IPv6 packet. La función ipv6_hop_jumbo en el archivo net/ipv6/exthdrs.c en el kernel de Linux versiones anteriores a 2.6.22, no comprueba apropiadamente el encabezado extendido de IPv6 salto a salto, lo que permite a los atacantes remotos causar u... • https://www.exploit-db.com/exploits/30902 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5966 – kernel: non-root can trigger cpu_idle soft lockup
https://notcve.org/view.php?id=CVE-2007-5966
20 Dec 2007 — Integer overflow in the hrtimer_start function in kernel/hrtimer.c in the Linux kernel before 2.6.23.10 allows local users to execute arbitrary code or cause a denial of service (panic) via a large relative timeout value. NOTE: some of these details are obtained from third party information. Desbordamiento de enteros en la función hrtimer_start en kernel/hrtimer.c en el kernel de Linux anterior a 2.6.23.10 permite a usuarios locales ejecutar código de su elección o provocar denegación de servicio (panic) a ... • http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23.10 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-189: Numeric Errors •
CVE-2007-6434
https://notcve.org/view.php?id=CVE-2007-6434
18 Dec 2007 — Linux kernel 2.6.23 allows local users to create low pages in virtual userspace memory and bypass mmap_min_addr protection via a crafted executable file that calls the do_brk function. Linux kernel 2.6.23 permite a usuarios locales crear páginas bajas en el espacio de la memoria virtual y evitar la protección mmap_min_addr a través de un archivo ejecutable manipulado que llama a una función do_brk. • http://kernel.org/pub/linux/kernel/v2.6/testing/ChangeLog-2.6.24-rc5 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-6417 – tmpfs: restore missing clear_highpage (kernels from 2.6.11 up)
https://notcve.org/view.php?id=CVE-2007-6417
18 Dec 2007 — The shmem_getpage function (mm/shmem.c) in Linux kernel 2.6.11 through 2.6.23 does not properly clear allocated memory in some rare circumstances related to tmpfs, which might allow local users to read sensitive kernel data or cause a denial of service (crash). La función shmem_getpage (mm/shmem.c) en el kernel de Linux versión 2.6.11 hasta 2.6.23 no borra de manera apropiada la memoria asignada en algunas circunstancias extrañas relacionadas con tmpfs, lo que podría permitir a los usuarios locales leer dat... • http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00002.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-399: Resource Management Errors •
CVE-2007-6151 – I4L: fix isdn_ioctl memory issue
https://notcve.org/view.php?id=CVE-2007-6151
15 Dec 2007 — The isdn_ioctl function in isdn_common.c in Linux kernel 2.6.23 allows local users to cause a denial of service via a crafted ioctl struct in which iocts is not null terminated, which triggers a buffer overflow. La función isdn_ioctl en isdn_common.c en Linux kernel 2.6.23 permite a usuarios locales provocar denegación de servicio a través de una estructura ioctl manipulada en cuyo iocts no tiene un final null, lo cual dispara un desbordamiento de búfer. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=eafe1aa37e6ec2d56f14732b5240c4dd09f0613a • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-6206 – Issue with core dump owner
https://notcve.org/view.php?id=CVE-2007-6206
04 Dec 2007 — The do_coredump function in fs/exec.c in Linux kernel 2.4.x and 2.6.x up to 2.6.24-rc3, and possibly other versions, does not change the UID of a core dump file if it exists before a root process creates a core dump in the same location, which might allow local users to obtain sensitive information. La función do_coredump en el archivo fs/exec.c en el kernel de Linux versiones 2.4.x y versiones 2.6.x hasta 2.6.24-rc3, y posiblemente otras versiones, no cambia el UID de un archivo de volcado de núcleo si ést... • http://bugzilla.kernel.org/show_bug.cgi?id=3043 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2007-6063 – Linux Kernel isdn_net_setcfg buffer overflow
https://notcve.org/view.php?id=CVE-2007-6063
21 Nov 2007 — Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function. Desbordamiento de búfer en la función isdn_net_setcfg en isdn_net.c en Linux kernel 2.6.23 permite a usuarios loclaes tener un impacto desconocido a través de un argumento manipulado en la función isdn_ioctl. • http://bugzilla.kernel.org/show_bug.cgi?id=9416 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-5500 – kernel hang via userspace PTRACE+waitid
https://notcve.org/view.php?id=CVE-2007-5500
20 Nov 2007 — The wait_task_stopped function in the Linux kernel before 2.6.23.8 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors. NOTE: some of these details are obtained from third party information. La función wait_task_stopped en el kernel de Linux versiones anteriores a 2.6.23.8 comprueba un bit TASK_TRACED en vez de un valor exit_state, lo cual permite a usuarios locales provocar una denegación de servicio (caída d... • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git%3Ba=commitdiff%3Bh=36ef66c5d137b9a31fd8c35d236fb9e26ef74f97 •
CVE-2007-5501
https://notcve.org/view.php?id=CVE-2007-5501
15 Nov 2007 — The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.21 through 2.6.23.7, and 2.6.24-rc through 2.6.24-rc2, allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference. La función tcp_sacktag_write_queue en el archivo net/ipv4/tcp_input.c en el kernel de Linux versiones 2.6.21 hasta 2.6.23.7 ??y versiones 2.6.24-rc hasta 2.6.24-rc2, permite a atacantes remotos causar una denegación de servicio (bloqueo de aplicaci... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=96a2d41a3e495734b63bff4e5dd0112741b93b38 • CWE-399: Resource Management Errors •
CVE-2007-5904 – Buffer overflow in CIFS VFS
https://notcve.org/view.php?id=CVE-2007-5904
09 Nov 2007 — Multiple buffer overflows in CIFS VFS in Linux kernel 2.6.23 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via long SMB responses that trigger the overflows in the SendReceive function. Múltiples desbordamientos de búfer en el CIFS VFS en el kernel de Linux 2.6.23 y versiones anteriores permiten a atacantes remotos provocar una denegación de servicio (caída) y, posiblemente, ejecutar código de su elección a través de respuestas SMB largas, que d... • http://git.kernel.org/?p=linux/kernel/git/sfrench/cifs-2.6.git%3Ba=commitdiff%3Bh=133672efbc1085f9af990bdc145e1822ea93bcf3 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •