CVE-2011-3637 – kernel: proc: fix oops on invalid /proc/<pid>/maps access
https://notcve.org/view.php?id=CVE-2011-3637
The m_stop function in fs/proc/task_mmu.c in the Linux kernel before 2.6.39 allows local users to cause a denial of service (OOPS) via vectors that trigger an m_start error. La función m_stop en fs/proc/task_mmu.c en el kernel de Linux antes de v2.6.39 permite a usuarios locales provocar una denegación de servicio a través de vectores que provocan un error m_start. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=76597cd31470fa130784c78fadb4dab2e624a723 http://www.openwall.com/lists/oss-security/2012/02/06/1 https://bugzilla.redhat.com/show_bug.cgi?id=747848 https://github.com/torvalds/linux/commit/76597cd31470fa130784c78fadb4dab2e624a723 https://access.redhat.com/security/cve/CVE-2011-3637 • CWE-476: NULL Pointer Dereference •
CVE-2011-4325 – kernel: nfs: diotest4 from LTP crash client null pointer deref
https://notcve.org/view.php?id=CVE-2011-4325
The NFS implementation in Linux kernel before 2.6.31-rc6 calls certain functions without properly initializing certain data, which allows local users to cause a denial of service (NULL pointer dereference and O_DIRECT oops), as demonstrated using diotest4 from LTP. La implementación de NFS en el kernel de Linux antes de v2.6.31-rc6 llama a ciertas funciones sin inicializar adecuadamente ciertos datos, lo que permite a usuarios locales provocar una denegación de servicio (desrefenrencia de puntero NULL y oops de O_DIRECT), como se demuestra usando diotest4 de LTP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=1ae88b2e4 http://www.securityfocus.com/bid/51366 https://bugzilla.redhat.com/show_bug.cgi?id=755455 https://exchange.xforce.ibmcloud.com/vulnerabilities/72297 https://access.redhat.com/security/cve/CVE-2011-4325 • CWE-476: NULL Pointer Dereference •
CVE-2011-4127 – kernel: possible privilege escalation via SG_IO ioctl
https://notcve.org/view.php?id=CVE-2011-4127
The Linux kernel before 3.2.2 does not properly restrict SG_IO ioctl calls, which allows local users to bypass intended restrictions on disk read and write operations by sending a SCSI command to (1) a partition block device or (2) an LVM volume. El kernel de Linux anterior a v3.2.2 no restringe adecuadamente llamadas SG_IO ioctl, permitiendo a usuarios locales eludir restricciones de lectura y escritura en disco mediante el envío de un comando SCSI a (1) un dispositivo de bloques de particiones o (2) un volumen LVM. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0bfc96cb77224736dfa35c3c555d37b3646ef35e http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=ec8013beddd717d1740cfefb1a9b900deef85462 http://lists.opensuse.org/opensuse-security-announce/2012-04/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html http://secunia.com/advisories/48898 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.2 http://www& • CWE-264: Permissions, Privileges, and Access Controls CWE-284: Improper Access Control •
CVE-2011-4087
https://notcve.org/view.php?id=CVE-2011-4087
The br_parse_ip_options function in net/bridge/br_netfilter.c in the Linux kernel before 2.6.39 does not properly initialize a certain data structure, which allows remote attackers to cause a denial of service by leveraging connectivity to a network interface that uses an Ethernet bridge device. La función br_parse_ip_options en net/bridge/br_netfilter.c de los kernel Linux anteriores a v2.6.39 no inicia adecuadamente cierta estructura de datos, permitiendo que atacantes remotos provoquen denegaciones de servicio mediante la indicación de conexión a un interfaz de red que usa un dispositivo bridge Ethernet. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f8e9881c2aef1e982e5abc25c046820cd0b7cf64 http://www.openwall.com/lists/oss-security/2011/10/28/14 https://github.com/torvalds/linux/commit/f8e9881c2aef1e982e5abc25c046820cd0b7cf64 • CWE-665: Improper Initialization •
CVE-2011-3638 – kernel: ext4: ext4_ext_insert_extent() kernel oops
https://notcve.org/view.php?id=CVE-2011-3638
fs/ext4/extents.c in the Linux kernel before 3.0 does not mark a modified extent as dirty in certain cases of extent splitting, which allows local users to cause a denial of service (system crash) via vectors involving ext4 umount and mount operations. fs/ext4/extents.c en el kernel de Linux anterior a v3.0 no marca una medida de lo modificado como sucio ("dirty") en determinados casos de "extent splitting", permitiendo a usuarios locales provocar una denegación de servicio (caída del sistema) a través de vectores relacionados con ext4 umount y operaciones de montaje. • http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3 http://www.openwall.com/lists/oss-security/2011/10/24/2 https://bugzilla.redhat.com/show_bug.cgi?id=747942 https://github.com/torvalds/linux/commit/667eff35a1f56fa74ce98a0c7c29a40adc1ba4e3 https://access.redhat.com/security/cve/CVE-2011-3638 •