CVE-2012-2669
https://notcve.org/view.php?id=CVE-2012-2669
The main function in tools/hv/hv_kvp_daemon.c in hypervkvpd, as distributed in the Linux kernel before 3.4.5, does not validate the origin of Netlink messages, which allows local users to spoof Netlink communication via a crafted connector message. La función principal de tools/hv/hv_kvp_daemon.c en hypervkvpd, distribuido en el kernel de Linux antes de v3.4.5, no valida el origen de los mensajes netlink, lo que permite a usuarios locales falsificar comunicaciones netlink a través de un mensaje modificado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c http://lists.opensuse.org/opensuse-updates/2012-11/msg00042.html http://openwall.com/lists/oss-security/2012/06/06/12 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 http://www.openwall.com/lists/oss-security/2012/11/27/12 https://bugzilla.novell.com/show_bug.cgi?id=761200 https://github.com/torvalds/linux/commit/bcc2c9c3fff859e0eb019fe6fec26f9b8eba795c • CWE-20: Improper Input Validation •
CVE-2012-5517 – kernel: mm/hotplug: failure in propagating hot-added memory to other nodes
https://notcve.org/view.php?id=CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. La función online_pages mm/memory_hotplug.c en el kernel de Linux en versiones anteriores a v3.6 permite a usuarios locales provocar una denegación de servicio (desreferencia de puntero NULL y caída del sistema) o posiblemente tener otro impacto no especificado en determinadas circunstancias mediante el uso de memoria que fue añadida en caliente por al administrador. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=08dff7b7d629807dbb1f398c68dd9cd58dd657a1 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html http://rhn.redhat.com/errata/RHSA-2012-1580.html http://www.kernel.org/pub/linux/kernel/v3.x http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2 http://www.openwall.com/lists/oss-security/2012/11/13/11 http://www.securityfocus.com/bid/56527 http://www.ubuntu.com/usn •
CVE-2012-4444 – kernel: net: acceptation of overlapping ipv6 fragments
https://notcve.org/view.php?id=CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. La función ip6_frag_queue en net/ipv6/reassembly.c en el kernel de Linux antes de v2.6.36 permite a atacantes remotos evitar las restricciones de red a través de la superposición de fragmentos IPv6. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html http://rhn.redhat.com/errata/RHSA-2012-1580.html http://www.openwall.com/lists/oss-security/2012/11/09/2 http://www.ubuntu.com/usn/USN-1660-1 http://www.ubuntu.com/usn/USN-1661-1 https://bugzilla.redhat.com/sh •
CVE-2012-4508 – kernel: ext4: AIO vs fallocate stale data exposure
https://notcve.org/view.php?id=CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized. Condición de carrera en fs/ext4/extents.c. En el kernel Linux antes de v3.4.16 permite a usuarios locales obtener información sensible de un archivo eliminado mediante la lectura de un 'extent' que no fue correctamente marcado como 'no inicializado' . • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dee1f973ca341c266229faa5a1a5bb268bed3531 http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html http://rhn.redhat.com/errata/RHSA-2012-1540.html http://rhn.redhat.com/errata/RHSA-2013-0496.html http://rhn.redhat.com/errata/RHSA-2013-1519.html http://rhn.redhat.com/errata/RHSA-2013-1783.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.16 http://www.openw • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2012-0957 – Linux Kernel 3.2.x - 'uname()' System Call Local Information Disclosure
https://notcve.org/view.php?id=CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. La función override_release en kernel/sys.c en el kernel de Linux antes de v3.4.16 permite a usuarios locales obtener información sensible de la memoria de la pila del núcleo a través de una llamada al sistema uname junto con una personalidad UNAME26. • https://www.exploit-db.com/exploits/37937 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2702b1526c7278c4d65d78de209a465d4de2885e http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html http://secunia.com/advisories/51409 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.16 http://www.openwall.com/lists/oss-security/2012/10/09/4 http://www.ubuntu.com/usn/USN-1644-1 http://www.ubuntu.com/usn/USN-1645- • CWE-16: Configuration CWE-401: Missing Release of Memory after Effective Lifetime •