CVE-2013-2929 – kernel: exec/ptrace: get_dumpable() incorrect tests
https://notcve.org/view.php?id=CVE-2013-2929
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. El kernel Linux anterior a 3.12.2 no utiliza apropiadamente la función get_dumpable, lo que permite a usuarios locales sortear restricciones ptrace u obtener información sensible de los registros IA64 a través de una aplicación manipulada, relacionado con kernel/ptrace.c y arch/ia64/include/asm/processor.h A flaw was found in the way the get_dumpable() function return value was interpreted in the ptrace subsystem of the Linux kernel. When 'fs.suid_dumpable' was set to 2, a local, unprivileged local user could use this flaw to bypass intended ptrace restrictions and obtain potentially sensitive information. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d049f74f2dbe71354d43d393ac3a188947811348 http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00025.html http://rhn.redhat.com/errata/RHSA-2014-0100.html http://rhn.redhat.com/errata/RHSA-2014-0159.html http://rhn.redhat.com/errata/RHSA-2014-0285.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.12.2 http: • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2013-4270 – kernel: net: permissions flaw in /proc/sys/net
https://notcve.org/view.php?id=CVE-2013-4270
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. La función net_ctl_permissions en net/sysctl_net.c en el kernel Linux anteriores a 3.11.5 no determina apropiadamente valores uid y gid, lo que permite a usuarios locales franquear restricciones /proc/sys/net a traves de una aplicación manipulada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2433c8f094a008895e66f25bd1773cdb01c91d01 http://rhn.redhat.com/errata/RHSA-2014-0100.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.11.5 http://www.ubuntu.com/usn/USN-2049-1 https://bugzilla.redhat.com/show_bug.cgi?id=1027752 https://github.com/torvalds/linux/commit/2433c8f094a008895e66f25bd1773cdb01c91d01 https://access.redhat.com/security/cve/CVE-2013-4270 • CWE-20: Improper Input Validation •
CVE-2013-6382
https://notcve.org/view.php?id=CVE-2013-6382
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. Múltiples desbordamientos de búfer en la implementación XFS del kernel de Linux hasta la versión 3.12.1 permite a usuarios locales provocar una denegación de servicio (corrupción de memoria) o posiblemente tener otro impacto sin especificar mediante el aprovechamiento de la capacidad CAP_SYS_ADMIN para una llamada ioctl en (1) XFS_IOC_ATTRLIST_BY_HANDLE o (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 con un valor de longitud manipulado, relacionado con la función xfs_attrlist_by_handle en fs/xfs/xfs_ioctl.c y la función xfs_compat_attrlist_by_handle en fs/xfs/xfs_ioctl32.c. • http://www.openwall.com/lists/oss-security/2013/11/22/5 http://www.securityfocus.com/bid/63889 http://www.spinics.net/lists/xfs/msg23343.html http://www.ubuntu.com/usn/USN-2109-1 http://www.ubuntu.com/usn/USN-2110-1 http://www.ubuntu.com/usn/USN-2113-1 http://www.ubuntu.com/usn/USN-2117-1 http://www.ubuntu.com/usn/USN-2128-1 http://www.ubuntu.com/usn/USN-2129-1 http://www.ubuntu.com/usn/USN-2135-1 http://www.ubuntu.com/u • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-6380
https://notcve.org/view.php?id=CVE-2013-6380
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command. La función aac_send_raw_srb en drivers/scsi/aacraid/commctrl.c del kernel de Linux hasta la versión 3.12.1 no valida adecuadamente un valor de determinado tamaño, lo que permite a usuarios locales provocar una denegación de servicio (referencia a puntero nulo) o posiblemente tener otro impacto sin especificar a través de una llamada ioctl FSACTL_SEND_RAW_SRB que desencadena un comando SRB manipulado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=b4789b8e6be3151a955ade74872822f30e8cd914 http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html http://www.openwall.com/lists/oss-security/2013/11/22/5 http://www.ubuntu.com/usn/USN-2070-1 http://www.ubuntu.com/usn/USN-2075-1 http://www.ubuntu.com/usn/USN-2109-1 http://www.ubuntu.com/usn/USN-2110-1 ht • CWE-20: Improper Input Validation •
CVE-2013-6378 – Kernel: drivers: libertas: potential oops in debugfs
https://notcve.org/view.php?id=CVE-2013-6378
The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation. La función lbs_debugfs_write en drivers/net/wireless/libertas/debugfs.c del kernel de Linux hasta la versión 3.12.1 permite a usuarios locales provocar una denegación de servicio (OOPS) mediante el aprovechamiento de privilegios de root por una operación de escritura de longitud cero. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a497e47d4aec37aaf8f13509f3ef3d1f6a717d88 http://linux.oracle.com/errata/ELSA-2014-0771.html http://linux.oracle.com/errata/ELSA-2014-3043.html http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00002.html http://lists.opensuse.org/opensuse-updates/2014-02/msg00045.html http://rhn.redhat.com/errata/RHSA-2014-0100.html http://secunia.com/advisories/59262 http://secunia.com/advisories/59309 http: • CWE-189: Numeric Errors •