![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-2148 – kernel: fix permission checking in sys_utimensat
https://notcve.org/view.php?id=CVE-2008-2148
12 May 2008 — The utimensat system call (sys_utimensat) in Linux kernel 2.6.22 and other versions before 2.6.25.3 does not check file permissions when certain UTIME_NOW and UTIME_OMIT combinations are used, which allows local users to modify file times of arbitrary files, possibly leading to a denial of service. Una llamada de sistema utimensat (sys_utimensat) en el Kernel de Linux versión 2.6.22 y otras versiones anteriores a 2.6.25.3, no comprueba los permisos de los archivos cuando son usadas ciertas combinaciones UTI... • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.25.y.git%3Ba=commit%3Bh=f9dfda1ad0637a89a64d001cf81478bd8d9b6306 • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-5498 – missing sanity check in xen block backend driver
https://notcve.org/view.php?id=CVE-2007-5498
08 May 2008 — The Xen hypervisor block backend driver for Linux kernel 2.6.18, when running on a 64-bit host with a 32-bit paravirtualized guest, allows local privileged users in the guest OS to cause a denial of service (host OS crash) via a request that specifies a large number of blocks. El driver Xen hypervisor block backend (situado entre el hardware y el sistema operativo) para el Kernel de Linux 2.6.18, cuando corre en un host de 64 bit con un cliente paravirtualizado de 32 bit, permite a usuarios locales con priv... • http://secunia.com/advisories/30116 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1669 – kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c
https://notcve.org/view.php?id=CVE-2008-1669
08 May 2008 — Linux kernel before 2.6.25.2 does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain "re-ordered access to the descriptor table." El kernel de Linux en versiones posteriores a la 2.6.25.2, no aplica determinados mecanismos de protección para la funcionalidad fcntl, la cual permite a usuarios locales (1) ejecutar código en paralelo o (2) explotar una condición de carrera (race condition) para obt... • http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1375 – kernel: race condition in dnotify (local DoS, local roothole possible)
https://notcve.org/view.php?id=CVE-2008-1375
02 May 2008 — Race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before 2.6.24.6, and 2.6.25 before 2.6.25.1, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors. Una condición de carrera en el subsistema directory notification (dnotify) en el Kernel de Linux versiones 2.6.x anteriores a 2.6.24.6, y versiones 2.6.25 anteriores a 2.6.25.1, permite a usuarios locales causar una denegación de servicio (OOPS) y posiblemente alcanzar p... • http://lists.opensuse.org/opensuse-security-announce/2008-06/msg00006.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1675
https://notcve.org/view.php?id=CVE-2008-1675
02 May 2008 — The bdx_ioctl_priv function in the tehuti driver (tehuti.c) in Linux kernel 2.6.x before 2.6.25.1 does not properly check certain information related to register size, which has unspecified impact and local attack vectors, probably related to reading or writing kernel memory. La función bdx_ioctl_priv en el controlador tehuti (archivo tehuti.c) en el Kernel de Linux versiones 2.6.x anteriores a 2.6.25.1, no comprueba apropiadamente cierta información relacionada al tamaño del registro, que presenta un impac... • http://marc.info/?l=linux-kernel&m=120949204519706&w=2 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1294 – kernel: setrlimit(RLIMIT_CPUINFO) with zero value doesn't inherit properly across children
https://notcve.org/view.php?id=CVE-2008-1294
02 May 2008 — Linux kernel 2.6.17, and other versions before 2.6.22, does not check when a user attempts to set RLIMIT_CPU to 0 until after the change is made, which allows local users to bypass intended resource limits. El Kernel de Linus 2.6.17 y otras versiones anteriores a la 2.6.22 no comprueba cuándo un usuario intenta establecer el RLIMIT_CPU a 0 hasta después de que se realice el cambio, lo que permite a los usuarios locales evitar los límites a recursos establecidos. • http://bugs.gentoo.org/show_bug.cgi?id=215000 • CWE-20: Improper Input Validation CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2007-6712 – kernel: infinite loop in highres timers (kernel hang)
https://notcve.org/view.php?id=CVE-2007-6712
12 Apr 2008 — Integer overflow in the hrtimer_forward function (hrtimer.c) in Linux kernel 2.6.21-rc4, when running on 64-bit systems, allows local users to cause a denial of service (infinite loop) via a timer with a large expiry value, which causes the timer to always be expired. Desbordamiento de entero en la función hrtimer_forward function (hrtimer.c) en el kernel 2.6.21-rc4 de Linux, cuando corren en sistemas de 64-bit, permite a los usuarios locales provocar una denegación de servicio (bucle infinito) mediante un ... • http://git.kernel.org/?p=linux/kernel/git/chris/linux-2.6.git%3Ba=commitdiff%3Bh=13788ccc41ceea5893f9c747c59bc0b28f2416c2 • CWE-189: Numeric Errors CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-1514 – kernel: ptrace: Padding area write - unprivileged kernel crash
https://notcve.org/view.php?id=CVE-2008-1514
26 Mar 2008 — arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions before 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in 31-bit mode, which triggers an invalid dereference. El archivo arch/s390/kernel/ptrace.c en el kernel de Linux versión 2.6.9 y otras versiones anteriores a 2.6.27-rc6, en plataformas s390 permite a los usuarios locales causar una denegación de servicio (pánico del kernel) por medio d... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=3d6e48f43340343d97839eadb1ab7b6a3ea98797 • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-0010 – Linux Kernel 2.6.17 < 2.6.24.1 - 'vmsplice' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2008-0010
12 Feb 2008 — The copy_from_user_mmap_sem function in fs/splice.c in the Linux kernel 2.6.22 through 2.6.24 does not validate a certain userspace pointer before dereference, which allow local users to read from arbitrary kernel memory locations. La copia de la función copy_from_user_mmap_semen fs/splice.c en kernel linux de la versión 2.6.22 a la 2.6.24, no valida ciertos referencias a punteros en memoria, que permite a usuarios locales leer espacios de memoria del kernel de su elección. • https://www.exploit-db.com/exploits/5092 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2008-0163
https://notcve.org/view.php?id=CVE-2008-0163
12 Feb 2008 — Linux kernel 2.6, when using vservers, allows local users to access resources of other vservers via a symlink attack in /proc. Linux kernel 2.6, cuando usa vservers, permite a usuarios locales acceder a recursos de otros vservers a través de un ataque de enlaces simbólicos en /proc. • http://secunia.com/advisories/28875 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •