
CVE-2012-0207 – Linux Kernel 2.6.36 IGMP - Remote Denial of Service
https://notcve.org/view.php?id=CVE-2012-0207
17 May 2012 — The igmp_heard_query function in net/ipv4/igmp.c in the Linux kernel before 3.2.1 allows remote attackers to cause a denial of service (divide-by-zero error and panic) via IGMP packets. La función de igmp_heard_query net/ipv4/igmp.c en el kernel de Linux en versiones anteriores a la v3.2.1 permite a atacantes remotos causar una denegación de servicio (error de división por cero y el "kernel panic") a través de paquetes IGMP. • https://www.exploit-db.com/exploits/18378 • CWE-369: Divide By Zero •

CVE-2011-4594 – kernel: send(m)msg: user pointer dereferences
https://notcve.org/view.php?id=CVE-2011-4594
17 May 2012 — The __sys_sendmsg function in net/socket.c in the Linux kernel before 3.1 allows local users to cause a denial of service (system crash) via crafted use of the sendmmsg system call, leading to an incorrect pointer dereference. La función __ sys_sendmsg en net/socket.c en el kernel de Linux antes de v3.1 permite a usuarios locales causar una denegación de servicio (caída del sistema) mediante el uso de una llamada a la 'system call' sendmmsg debidamente modificada, dando lugar a una eliminación de referencia... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc909d9ddbf7778371e36a651d6e4194b1cc7d4c • CWE-476: NULL Pointer Dereference •

CVE-2012-2319 – kernel: Buffer overflow in the HFS plus filesystem (different issue than CVE-2009-4020)
https://notcve.org/view.php?id=CVE-2012-2319
17 May 2012 — Multiple buffer overflows in the hfsplus filesystem implementation in the Linux kernel before 3.3.5 allow local users to gain privileges via a crafted HFS plus filesystem, a related issue to CVE-2009-4020. Múltiples vulnerabilidades de desbordamiento de buffer en la implementación de filesystem hfsplus in el núcleo de Linux antes de la versión v3.3.5 que permite a usuarios locales conseguir privilegios a través de HFS plus filesystem, un problema relacionado con CVE-2009-4020. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6f24f892871acc47b40dd594c63606a17c714f77 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-264: Permissions, Privileges, and Access Controls •

CVE-2011-4330 – kernel: hfs: add sanity check for file name length
https://notcve.org/view.php?id=CVE-2011-4330
27 Jan 2012 — Stack-based buffer overflow in the hfs_mac2asc function in fs/hfs/trans.c in the Linux kernel 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via an HFS image with a crafted len field. Un desbordamiento de búfer basado en pila en la función hfs_mac2asc en fs/hfs/trans.c en el kernel de Linux v2.6 permite a usuarios locales provocar una denegación de servicio (mediante caída del sistema) y posiblemente ejecutar código de su elección a través de una imagen HFS c... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=bc5b8a9003132ae44559edd63a1623 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-0056 – Linux Kernel 2.6.39 < 3.2.2 (x86/x64) - 'Mempodipper' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2012-0056
27 Jan 2012 — The mem_write function in the Linux kernel before 3.2.2, when ASLR is disabled, does not properly check permissions when writing to /proc/

CVE-2011-4077 – kernel: xfs: potential buffer overflow in xfs_readlink()
https://notcve.org/view.php?id=CVE-2011-4077
27 Jan 2012 — Buffer overflow in the xfs_readlink function in fs/xfs/xfs_vnodeops.c in XFS in the Linux kernel 2.6, when CONFIG_XFS_DEBUG is disabled, allows local users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code via an XFS image containing a symbolic link with a long pathname. Un desbordamiento de búfer en la función xfs_readlink en fs/xfs/xfs_vnodeops.c en XFS en el kernel de Linux v2.6, cuando CONFIG_XFS_DEBUG está desactivado, permite a usuarios locales provocar una... • http://marc.info/?l=bugtraq&m=139447903326211&w=2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2011-2928
https://notcve.org/view.php?id=CVE-2011-2928
29 Aug 2011 — The befs_follow_link function in fs/befs/linuxvfs.c in the Linux kernel before 3.1-rc3 does not validate the length attribute of long symlinks, which allows local users to cause a denial of service (incorrect pointer dereference and OOPS) by accessing a long symlink on a malformed Be filesystem. La función befs_follow_link en fs/befs/linuxvfs.c en el Kernel de Linux anterior a v 3.1-rc3 no valida el atributo longitud de enlaces simbólicos, lo que permite a usuarios locales provocar una denegación de servici... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=338d0f0a6fbc82407864606f5b64b75aeb3c70f2 • CWE-476: NULL Pointer Dereference •

CVE-2001-0886
https://notcve.org/view.php?id=CVE-2001-0886
21 Dec 2001 — Buffer overflow in glob function of glibc allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a glob pattern that ends in a brace "{" character. Desbordamiento de buffer en la función glob de glibc para Red Hat Linux 6.2 a 7.2, y otros sistemas operativos, permite a atacantes causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrarios mediante un patrón de glob que acaba en una llave "{" • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000447 •

CVE-1999-1332
https://notcve.org/view.php?id=CVE-1999-1332
31 Dec 1999 — gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file. • http://marc.info/?l=bugtraq&m=88603844115233&w=2 •

CVE-1999-1333
https://notcve.org/view.php?id=CVE-1999-1333
31 Dec 1999 — automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded. • http://marc.info/?l=bugtraq&m=89042322924057&w=2 •