
CVE-2010-2071
https://notcve.org/view.php?id=CVE-2010-2071
16 Jun 2010 — The btrfs_xattr_set_acl function in fs/btrfs/acl.c in btrfs in the Linux kernel 2.6.34 and earlier does not check file ownership before setting an ACL, which allows local users to bypass file permissions by setting arbitrary ACLs, as demonstrated using setfacl. La función btrfs_xattr_set_acl en fs/btrfs/acl.c en btrfs en el kernel de linux v2.6.34 y anteriores no valida quien es el propietario de un archivo antes de establecer una ACL, lo que permite a usuarios locales evitar los permisos de fichero estable... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=2f26afba • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-1636 – Linux Kernel 2.6.x - Btrfs Cloned File Security Bypass
https://notcve.org/view.php?id=CVE-2010-1636
07 Jun 2010 — The btrfs_ioctl_clone function in fs/btrfs/ioctl.c in the btrfs functionality in the Linux kernel 2.6.29 through 2.6.32, and possibly other versions, does not ensure that a cloned file descriptor has been opened for reading, which allows local users to read sensitive information from a write-only file descriptor. La función btrfs_ioctl_clone en fs/btrfs/ioctl.c en la funcionalidad btrfs del kernel de Linux v2.6.29 a v2.6.32, y posiblemente otras versiones, no garantiza que un descriptor de archivo clonado h... • https://www.exploit-db.com/exploits/34001 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2010-1641 – kernel: GFS2: The setflags ioctl() doesn't check file ownership
https://notcve.org/view.php?id=CVE-2010-1641
01 Jun 2010 — The do_gfs2_set_flags function in fs/gfs2/file.c in the Linux kernel before 2.6.34-git10 does not verify the ownership of a file, which allows local users to bypass intended access restrictions via a SETFLAGS ioctl request. La función "do_gfs2_set_flags" en "fs/gfs2/file.c" del kernel de Linux anterior a v2.6.34-git10 no comprueba el propietario del archivo, lo que permite a usuarios locales evitar restricciones de acceso intencionadas a través de peticiones SETFLAGS ioctl. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7df0e0397b9a18358573274db9fdab991941062f • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-1446
https://notcve.org/view.php?id=CVE-2010-1446
21 May 2010 — arch/powerpc/mm/fsl_booke_mmu.c in KGDB in the Linux kernel 2.6.30 and other versions before 2.6.33, when running on PowerPC, does not properly perform a security check for access to a kernel page, which allows local users to overwrite arbitrary kernel memory, related to Fsl booke. arch/powerpc/mm/fsl_booke_mmu.c en KGDB del kernel de Linux v2.6.30 y otras versiones anteriores a la v2.6.33, cuando se ejecuta en PowerPC, no realiza apropiadamente una comprobación de seguridad para acceder a la página del ker... • http://lists.opensuse.org/opensuse-security-announce/2010-07/msg00006.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2010-1173 – Linux Kernel 2.6.33.3 - SCTP INIT Remote Denial of Service
https://notcve.org/view.php?id=CVE-2010-1173
07 May 2010 — The sctp_process_unk_param function in net/sctp/sm_make_chunk.c in the Linux kernel 2.6.33.3 and earlier, when SCTP is enabled, allows remote attackers to cause a denial of service (system crash) via an SCTPChunkInit packet containing multiple invalid parameters that require a large amount of error data. La función sctp_process_unk_param en net/sctp/sm_make_chunk.c en el kernel de Linux v2.6.33.3 y anteriores, cuando está activado SCTP, permite a atacantes remotos provocar una denegación de servicio (caída ... • https://www.exploit-db.com/exploits/14594 • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2010-1437 – Linux Kernel 2.6.34 - 'find_keyring_by_name()' Local Memory Corruption
https://notcve.org/view.php?id=CVE-2010-1437
07 May 2010 — Race condition in the find_keyring_by_name function in security/keys/keyring.c in the Linux kernel 2.6.34-rc5 and earlier allows local users to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via keyctl session commands that trigger access to a dead keyring that is undergoing deletion by the key_cleanup function. Condición de carrera en la función find_keyring_by_name en security/keys/keyring.c el el kernel de Linux v2.6.34-rc5 y anteriores, permite u... • https://www.exploit-db.com/exploits/33886 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-416: Use After Free •

CVE-2010-1451
https://notcve.org/view.php?id=CVE-2010-1451
07 May 2010 — The TSB I-TLB load implementation in arch/sparc/kernel/tsb.S in the Linux kernel before 2.6.33 on the SPARC platform does not properly obtain the value of a certain _PAGE_EXEC_4U bit and consequently does not properly implement a non-executable stack, which makes it easier for context-dependent attackers to exploit stack-based buffer overflows via a crafted application. La implementación TSB I-TLB en arch/sparc/kernel/tsb.S en el kernel de Linux anterior a v2.6.33 en plataformas SPARC, no obtiene de forma a... • http://marc.info/?l=linux-sparc&m=126662159602378&w=2 • CWE-787: Out-of-bounds Write •

CVE-2010-1162 – kernel: tty: release_one_tty() forgets to put pids
https://notcve.org/view.php?id=CVE-2010-1162
20 Apr 2010 — The release_one_tty function in drivers/char/tty_io.c in the Linux kernel before 2.6.34-rc4 omits certain required calls to the put_pid function, which has unspecified impact and local attack vectors. La función release_one_tty de drivers/char/tty_io.c del kernel de Linux en versiones anteriores a la 2.6.34-rc4 omite determinadas llamadas que se requieren a la función put_pid, lo que tiene un impacto sin especificar y vectores de ataque locales. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6da8d866d0d39e9509ff826660f6a86a6757c966 •

CVE-2010-1488
https://notcve.org/view.php?id=CVE-2010-1488
20 Apr 2010 — The proc_oom_score function in fs/proc/base.c in the Linux kernel before 2.6.34-rc4 uses inappropriate data structures during selection of a candidate for the OOM killer, which might allow local users to cause a denial of service via unspecified patterns of task creation. La función proc_oom_score de fs/proc/base.c en el kernel de Linux en versiones anteriores a la 2.6.34-rc4 utiliza de forma inapropiada estructuras de datos durante la selección de un candidato para ser tratado por el procesdo OOM killer, l... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b95c35e76b29ba812e5dabdd91592e25ec640e93 • CWE-399: Resource Management Errors •

CVE-2010-1146 – ReiserFS (Linux Kernel 2.6.34-rc3 / RedHat / Ubuntu 9.10) - 'xattr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2010-1146
12 Apr 2010 — The Linux kernel 2.6.33.2 and earlier, when a ReiserFS filesystem exists, does not restrict read or write access to the .reiserfs_priv directory, which allows local users to gain privileges by modifying (1) extended attributes or (2) ACLs, as demonstrated by deleting a file under .reiserfs_priv/xattrs/. El kernel de Linux v2.6.33.2 y anteriores, cuando esta sobre un sistema de fichero ReiserFS, no restringe adecuadamente la lectura o escritura al directorio .reiserfs_priv, lo que permite a usuarios locales ... • https://www.exploit-db.com/exploits/12130 • CWE-264: Permissions, Privileges, and Access Controls •