
CVE-2013-0217 – Mandriva Linux Security Advisory 2013-176
https://notcve.org/view.php?id=CVE-2013-0217
18 Feb 2013 — Memory leak in drivers/net/xen-netback/netback.c in the Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (memory consumption) by triggering certain error conditions. Fuga de memoria (memory leaks) en drivers/net/xen-netback/netback.c en la funcionalidad Xen netback en el kernel de Linux anterior a v3.7.8 permite a usuarios invitados generar una denegación de servicio (corrupción de memoria) cuando se producen determinados errores de condición. And... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=7d5145d8eb2b9791533ffe4dc003b129b9696c48 • CWE-399: Resource Management Errors •

CVE-2013-0268 – Linux Kernel 3.7.6 (RedHat x86/x64) - 'MSR' Driver Privilege Escalation
https://notcve.org/view.php?id=CVE-2013-0268
18 Feb 2013 — The msr_open function in arch/x86/kernel/msr.c in the Linux kernel before 3.7.6 allows local users to bypass intended capability restrictions by executing a crafted application as root, as demonstrated by msr32.c. La funcion msr_open en arch/x86/kernel/msr.c en el kernel de Linux anterior a v3.7.6 permite a usuarios locales eludir las capacidades de restricción mediante la ejecución de una aplicación manipulada como root, como se demostró con msr32.c. Andrew Jones discovered a flaw with the xen_iret functio... • https://packetstorm.news/files/id/122678 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-0216 – kernel: xen: Linux netback DoS via malicious guest ring.
https://notcve.org/view.php?id=CVE-2013-0216
18 Feb 2013 — The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption. La funcionalidad Xen netback en el kernel de Linux anterior a v3.7.8 permite a usuarios invitados del OS generar una denegación de servicio (bucle) mediante una corrupción de puntero. Andrew Cooper of Citrix reported a Xen stack corruption in the Linux kernel. An unprivileged user in a 32bit PVOPS guest can cause the guest kernel to crash, or operate... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664 • CWE-20: Improper Input Validation •

CVE-2013-0231 – kernel: xen: pciback DoS via not rate limited log messages
https://notcve.org/view.php?id=CVE-2013-0231
13 Feb 2013 — The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information. La función pciback_enable_msi en el controlador PCI backend (drivers/xen/pciback/conf_space_capability_msi.c) en Xen para Linux kernel v2.6.18 y v3.8, permite que los usuari... • http://lists.opensuse.org/opensuse-security-announce/2013-03/msg00004.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-0190 – kernel: stack corruption in xen_failsafe_callback()
https://notcve.org/view.php?id=CVE-2013-0190
12 Feb 2013 — The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption. La función xen_failsafe_callback de Xen para el kernel de Linux v2.6.23 y otras versiones, mientras ejecuta un invitado PVOPS de 32 bits, permite que usuarios locales provocar una denegación de servicios disparando el retorno de ... • http://rhn.redhat.com/errata/RHSA-2013-0496.html • CWE-20: Improper Input Validation •

CVE-2013-0160 – Linux Kernel 2.6.32-5 (Debian 6.0.5) - '/dev/ptmx' Key Stroke Timing Local Disclosure
https://notcve.org/view.php?id=CVE-2013-0160
31 Jan 2013 — The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device. El kernel de Linux hasta v3.7.9 permite a usuarios locales obtener información sensible mediante el "keystroke timing" con la API inotify en el dispositivo /dev/ptmx Kees Cook discovered a flaw in the Linux kernel's iSCSI subsystem. A remote unauthenticated attacker could exploit this flaw to cause a denial of service (system crash) or potentially gain ad... • https://packetstorm.news/files/id/119973 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2012-4461 – kernel: kvm: invalid opcode oops on SET_SREGS with OSXSAVE bit set
https://notcve.org/view.php?id=CVE-2012-4461
15 Jan 2013 — The KVM subsystem in the Linux kernel before 3.6.9, when running on hosts that use qemu userspace without XSAVE, allows local users to cause a denial of service (kernel OOPS) by using the KVM_SET_SREGS ioctl to set the X86_CR4_OSXSAVE bit in the guest cr4 register, then calling the KVM_RUN ioctl. El subsistema de KVM en el kernel de Linux antes de v3.6.9, cuando se ejecuta en máquinas que utilizan el espacio de usuario qemu sin XSAVE, permite a usuarios locales provocar una denegación de servicio (kernel oo... • http://article.gmane.org/gmane.comp.emulators.kvm.devel/100742 •

CVE-2012-4530 – Linux Kernel (Ubuntu 11.10/12.04) - binfmt_script Stack Data Disclosure
https://notcve.org/view.php?id=CVE-2012-4530
10 Jan 2013 — The load_script function in fs/binfmt_script.c in the Linux kernel before 3.7.2 does not properly handle recursion, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. La función load_script en fs/binfmt_script.c en el kernel de Linux anterior a v3.7.2 no controla correctamente la recursividad, permitiendo a usuarios locales obtener información sensible de la memoria de pila del kernl a través de una aplicación especialmente diseñada. USN-1704-1 fixed... • https://www.exploit-db.com/exploits/41767 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2012-2669 – Mandriva Linux Security Advisory 2013-176
https://notcve.org/view.php?id=CVE-2012-2669
27 Dec 2012 — The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. La función principal de tools/hv/hv_kvp_daemon.c en hypervkvpd, distribuido en el kernel de Linux antes de v3.4.5, no valida el origen de los mensajes netlink, lo que permite a usuarios locales falsificar comunicaciones netlink a través de un mensaje modificado. ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c • CWE-20: Improper Input Validation •

CVE-2012-5532 – hypervkvpd: Netlink source address validation allows denial of service
https://notcve.org/view.php?id=CVE-2012-5532
27 Dec 2012 — The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.8-rc1, allows local users to cause a denial of service (daemon exit) via a crafted application that sends a Netlink message. NOTE: this vulnerability exists because of an incorrect fix for CVE-2012-2669. La función principal de tools/hv/hv_kvp_daemon.c en hypervkvpd, distribuido en el kernel de Linux antes de v3.8-rc1, permite a usuarios locales provocar una denegación de servicio (salida ordenada del de... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=95a69adab9acfc3981c504737a2b6578e4d846ef •