CVE-2012-2384 – kernel: drm/i915: integer overflow in i915_gem_do_execbuffer()
https://notcve.org/view.php?id=CVE-2012-2384
Integer overflow in the i915_gem_do_execbuffer function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call. Desbordamiento de entero en la función i915_gem_do_execbuffer de drivers/gpu/drm/i915/i915_gem_execbuffer.c del subsistema Direct Rendering Manager (DRM) del kernel de Linux en versiones anteriores a la 3.3.5 en plataformas de 32-bit. Permite a usuarios locales provocar una denegación de servicio (escritura fuera del límite) o posiblemente tener otros inpactos sin especificar a través de una llamada ioctl modificada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=44afb3a04391a74309d16180d1e4f8386fdfa745 http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.5 http://www.openwall.com/lists/oss-security/2012/05/22/8 http://www.securityfocus.com/bid/53971 https://bugzilla.redhat.com/show_bug.cgi?id=824178 https://github.com/torvalds/linux/commit/44afb3a04391a74309d16180d1e4f8386fdfa745 https://access.redhat.com • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2012-2383 – kernel: drm/i915: integer overflow in i915_gem_execbuffer2()
https://notcve.org/view.php?id=CVE-2012-2383
Integer overflow in the i915_gem_execbuffer2 function in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 3.3.5 on 32-bit platforms allows local users to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted ioctl call. Desbordamiento de entero en la función i915_gem_execbuffer2 de drivers/gpu/drm/i915/i915_gem_execbuffer.c del subsistema Direct Rendering Manager (DRM) del kernel de Linux en versiones anteriores a la 3.3.5 en plataformas de 32-bit. Permite a usuarios locales provocar una denegación de servicio (escritura fuera del límite) o posiblemente tener otros inpactos sin especificar a través de una llamada ioctl modificada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ed8cd3b2cd61004cab85380c52b1817aca1ca49b http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://rhn.redhat.com/errata/RHSA-2012-1156.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.3.5 http://www.openwall.com/lists/oss-security/2012/05/22/8 http://www.securityfocus.com/bid/53971 https://bugzilla.redhat.com/show_bug.cgi?id=824176 https://github.com/torvalds/linux/commit/ • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2012-2313 – kernel: unfiltered netdev rio_ioctl access by users
https://notcve.org/view.php?id=CVE-2012-2313
The rio_ioctl function in drivers/net/ethernet/dlink/dl2k.c in the Linux kernel before 3.3.7 does not restrict access to the SIOCSMIIREG command, which allows local users to write data to an Ethernet adapter via an ioctl call. La función rio_ioctl de drivers/net/ethernet/dlink/dl2k.c del kernel de Linux en versiones anteriores a la 3.3.7 no restringe el acceso al comando SIOCSMIIREG, lo que permite a usuarios locales escribir datos a un adaptador Ethernet a través de una llamada ioctl. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=1bb57e940e1958e40d51f2078f50c3a96a9b2d75 http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://rhn.redhat.com/errata/RHSA-2012-1174.html http://rhn.redhat.com/errata/RHSA-2012-1481.html http://rhn.redhat.com/errata/RHSA-2012-1541.html http://rhn.redhat.com/errata/RHSA-2012-1589.html http://www.kernel.org/pub/linux/ke • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-2136 – kernel: net: insufficient data_len validation in sock_alloc_send_pskb()
https://notcve.org/view.php?id=CVE-2012-2136
The sock_alloc_send_pskb function in net/core/sock.c in the Linux kernel before 3.4.5 does not properly validate a certain length value, which allows local users to cause a denial of service (heap-based buffer overflow and system crash) or possibly gain privileges by leveraging access to a TUN/TAP device. La función sock_alloc_send_pskb en net/core/sock.c en el kernel de linux anterior a v3.4.5 no valida correctamente ciertos valores de longitud, permitiendo a usuarios locales causar una denegación de servicio (desbordamiento de búfer basado en el heap o caída del sistema) o ganar privilegios mediante el acceso a un dispositivo TUN/TAP • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=cc9b17ad29ecaa20bfe426a8d4dbfb94b13ff1cc http://rhn.redhat.com/errata/RHSA-2012-0743.html http://rhn.redhat.com/errata/RHSA-2012-1087.html http://secunia.com/advisories/50807 http://ubuntu.com/usn/usn-1529-1 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.5 http://www.securityfocus.com/bid/53721 http://www.ubuntu.com/usn/USN-1535-1 https://bugzilla.redhat.com/show_bug.cg • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2011-2707
https://notcve.org/view.php?id=CVE-2011-2707
The ptrace_setxregs function in arch/xtensa/kernel/ptrace.c in the Linux kernel before 3.1 does not validate user-space pointers, which allows local users to obtain sensitive information from kernel memory locations via a crafted PTRACE_SETXTREGS request. La función ptrace_setxregs en ??arch/xtensa/kernel/ptrace.c en el kernel de Linux antes de v3.1 no valida los punteros de espacio de usuario, lo que permite a usuarios locales obtener información sensible de las posiciones de memoria del kernel a través de una solicitud PTRACE_SETXTREGS modificada. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0d0138ebe24b94065580bd2601f8bb7eb6152f56 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 http://www.openwall.com/lists/oss-security/2011/07/20/18 https://github.com/torvalds/linux/commit/0d0138ebe24b94065580bd2601f8bb7eb6152f56 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •