CVE-2010-3086 – kernel panic via futex
https://notcve.org/view.php?id=CVE-2010-3086
include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault. include/asm-x86/futex.h en el kernel de Linux anterior a v2.6.25 no aplica adecuadamente corrección de excepciones, lo que permite a usuarios locales causar una denegación de servicio (mediante un 'panic') a través de una solicitud válida que provoca un fallo de página. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027 http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html http://marc.info/?l=oss-security&m=128935856605589&w=2 http://secunia.com/advisories/46397 http://securitytracker.com/id?1024709 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 http://www.redhat.com/suppo •
CVE-2010-4529
https://notcve.org/view.php?id=CVE-2010-4529
Integer underflow in the irda_getsockopt function in net/irda/af_irda.c in the Linux kernel before 2.6.37 on platforms other than x86 allows local users to obtain potentially sensitive information from kernel heap memory via an IRLMP_ENUMDEVICES getsockopt call. Un desbordamiento de enteros en la función irda_getsockopt en net/irda/af_irda.c en el kernel de Linux anterior a v2.6.37 en plataformas no x86 permite a usuarios locales obtener información potencialmente sensible de la memoria del kernel a través de llamadas getsockopt IRLMP_ENUMDEVICES. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fdac1e0697356ac212259f2147aa60c72e334861 http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html http://openwall.com/lists/oss-security/2010/12/23/1 http://openwall.com/lists/oss-security/2011/01/03/1 http://secunia.com/advisories/42684 http://secunia.com/advisories/43291 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 http://www.securityfocus.com/bid/45556 http& • CWE-191: Integer Underflow (Wrap or Wraparound) •
CVE-2010-4527 – kernel: buffer overflow in OSS load_mixer_volumes
https://notcve.org/view.php?id=CVE-2010-4527
The load_mixer_volumes function in sound/oss/soundcard.c in the OSS sound subsystem in the Linux kernel before 2.6.37 incorrectly expects that a certain name field ends with a '\0' character, which allows local users to conduct buffer overflow attacks and gain privileges, or possibly obtain sensitive information from kernel memory, via a SOUND_MIXER_SETLEVELS ioctl call. La función load_mixer_volumes en sound/oss/soundcard.c en el subsistema de sonido OSS del núcleo Linux anterior a v2.6.37 espera incorrectamente a que determinado nombre de campo termine con un carácter '\0', lo que permite a usuarios locales llevar a cabo ataques de desbordamiento de búfer y obtener privilegios o, posiblemente, obtener información sensible de la memoria del núcleo, a través de una llamada SOUND_MIXER_SETLEVELS ioctl. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d81a12bc29ae4038770e05dce4ab7f26fd5880fb http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html http://openwall.com/lists/oss-security/2010/12/31/1 http://openwall.com/lists/oss-security/2010/12/31/4 http://secunia.com/advisories/42765 http://secunia.com/advisories/43291 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 http://www.securityfocus.com/bid/45629 http& • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2010-4242 – kernel: missing tty ops write function presence check in hci_uart_tty_open()
https://notcve.org/view.php?id=CVE-2010-4242
The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver. La función hci_uart_tty_open del controlador HCI UART (drivers/bluetooth/hci_ldisc.c) del kernel de Linux 2.6.36, y posiblemente otras versiones, no verifica si el tty tiene una operación de escritura, lo que permite a usuarios locales provocar una denegación de servicio (desreferenciación de puntero a NULL) a través de vectores relacionados con el controlador de Bluetooth. • http://git.kernel.org/linus/c19483cc5e56ac5e22dd19cf25ba210ab1537773 http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00002.html http://secunia.com/advisories/42789 http://secunia.com/advisories/42890 http://secunia.com/advisories/42963 http://secunia.com/advisories/43291 http://secunia.com/advisories/46397 http://www.redhat.com/support/errata/RHSA-2011-0004.html http://www.redhat.com/support/errata/RHSA-2011-0007.html http://www.redhat.com/support/errata/RHSA-2011-0162.ht •
CVE-2010-4526 – kernel: sctp: a race between ICMP protocol unreachable and connect()
https://notcve.org/view.php?id=CVE-2010-4526
Race condition in the sctp_icmp_proto_unreachable function in net/sctp/input.c in Linux kernel 2.6.11-rc2 through 2.6.33 allows remote attackers to cause a denial of service (panic) via an ICMP unreachable message to a socket that is already locked by a user, which causes the socket to be freed and triggers list corruption, related to the sctp_wait_for_connect function. Condición de carrera en el kernel de Linux 2.6.11-rc2 hasta 2.6.33. Permite a atacantes remotos provocar una denegación de servicio (kernel panic) a través de un mensaje no enrutable ICMP a un socket que ya se encuentra bloqueado por un usuario, lo que provoca que el socket sea liberado y una corrupción de lista. Relacionado con la función sctp_wait_for_connect. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=50b5d6ad63821cea324a5a7a19854d4de1a0a819 http://secunia.com/advisories/42964 http://secunia.com/advisories/46397 http://www.openwall.com/lists/oss-security/2011/01/04/13 http://www.openwall.com/lists/oss-security/2011/01/04/3 http://www.redhat.com/support/errata/RHSA-2011-0163.html http://www.securityfocus.com/archive/1/520102/100/0/threaded http://www.securityfocus.com/bid/45661 http:/ • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •