
CVE-2012-0879 – kernel: block: CLONE_IO io_context refcounting issues
https://notcve.org/view.php?id=CVE-2012-0879
17 May 2012 — The I/O implementation for block devices in the Linux kernel before 2.6.33 does not properly handle the CLONE_IO feature, which allows local users to cause a denial of service (I/O instability) by starting multiple processes that share an I/O context. La implementación I/O para dispositivos de bloque en el núcleo de Linux anteriores a v2.6.33 no maneja adecuadamente la característica CLONE_IO, lo cual permite a usuarios locales causar una denegación de servicio (inestabilidad I/O) arrancando múltiples proce... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.33 • CWE-400: Uncontrolled Resource Consumption •

CVE-2012-2319 – kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
https://notcve.org/view.php?id=CVE-2012-2319
17 May 2012 — Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020. Múltiples vulnerabilidades de desbordamiento de buffer en la implementación de filesystem hfsplus in el núcleo de Linux antes de la versión v3.3.5 que permite a usuarios locales conseguir privilegios a través de HFS plus filesystem, un problema relacionado con CVE-2009-4020. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f24f892871acc47b40dd594c63606a17c714f77 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-2525 – kernel: kernel: net_sched: fix qdisc_notify()
https://notcve.org/view.php?id=CVE-2011-2525
02 Feb 2012 — The qdisc_notify function in net/sched/sch_api.c in the Linux kernel before 2.6.35 does not prevent tc_fill_qdisc function calls referencing builtin (aka CQ_F_BUILTIN) Qdisc structures, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) or possibly have unspecified other impact via a crafted call. La función qdisc_notify de net/sched/sch_api.c del kernel de Linux en versiones anteriores a la 2.6.35 no previene que la función tc_fill_qdisc haga referencia a estructuras ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=53b0f08042f04813cd1a7473dacd3edfacb28eb3 • CWE-476: NULL Pointer Dereference •

CVE-2011-1573 – kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set
https://notcve.org/view.php?id=CVE-2011-1573
02 Feb 2012 — net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data. net/sctp/sm_make_chunk.c del kernel de Linux en versiones anteriores a 2.6.34, si se utiliza addip_enable y auth_enable, no considera la cantidad de "padding" durante el cálculo de la longitud para ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8170c35e738d62e9919ce5b109cf4ed66e95bde • CWE-682: Incorrect Calculation •

CVE-2011-4330 – kernel: hfs: add sanity check for file name length
https://notcve.org/view.php?id=CVE-2011-4330
27 Jan 2012 — Stack-based buffer overflow in the hfs_mac2asc function in fs/hfs/trans.c in the Linux kernel 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via an HFS image with a crafted len field. Un desbordamiento de búfer basado en pila en la función hfs_mac2asc en fs/hfs/trans.c en el kernel de Linux v2.6 permite a usuarios locales provocar una denegación de servicio (mediante caída del sistema) y posiblemente ejecutar código de su elección a través de una imagen HFS c... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-0056 – Linux Kernel 2.6.39 < 3.2.2 (x86/x64) - 'Mempodipper' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2012-0056
27 Jan 2012 — The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/

CVE-2011-1162 – kernel: tpm: infoleak
https://notcve.org/view.php?id=CVE-2011-1162
27 Jan 2012 — The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command. La función tpm_read en el kernel de Linux v2.6 no limpia adecuadamante la memoria, lo que podría permitir leer los resultados de los comandos TPM anteriores a usuarios locales. • http://www.securityfocus.com/bid/50764 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2011-4325 – kernel: nfs: diotest4 from LTP crash client null pointer deref
https://notcve.org/view.php?id=CVE-2011-4325
27 Jan 2012 — The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP. La implementación de NFS en el kernel de Linux antes de v2.6.31-rc6 llama a ciertas funciones sin inicializar adecuadamente ciertos datos, lo que permite a usuarios locales provocar una denegación de servicio (desrefenrencia de puntero NULL y oop... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=1ae88b2e4 • CWE-476: NULL Pointer Dereference •

CVE-2011-4077 – kernel: xfs: potential buffer overflow in xfs_readlink()
https://notcve.org/view.php?id=CVE-2011-4077
27 Jan 2012 — Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname. Un desbordamiento de búfer en la función xfs_readlink en fs/xfs/xfs_vnodeops.c en XFS en el kernel de Linux v2.6, cuando CONFIG_XFS_DEBUG está desactivado, permite a usuarios locales provocar una... • http://marc.info/?l=bugtraq&m=139447903326211&w=2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-4132 – kernel: jbd/jbd2: invalid value of first log block leads to oops
https://notcve.org/view.php?id=CVE-2011-4132
27 Jan 2012 — The cleanup_journal_tail function in the Journaling Block Device (JBD) functionality in the Linux kernel 2.6 allows local users to cause a denial of service (assertion error and kernel oops) via an ext3 or ext4 image with an "invalid log first block value." La función cleanup_journal_tail en la funcionalidad JBD (Journaling Block Device) del kernel de Linux v2.6 permite a usuarios locales provocar una denegación de servicio (error de aserción y fallo del kernel) a través de una imagen ext3 o ext4 con un "va... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=8762202dd0d6e46854f786bdb6fb3780a1625efe • CWE-20: Improper Input Validation •