CVE-2012-5517 – kernel: mm/hotplug: failure in propagating hot-added memory to other nodes
https://notcve.org/view.php?id=CVE-2012-5517
The online_pages function in mm/memory_hotplug.c in the Linux kernel before 3.6 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact in opportunistic circumstances by using memory that was hot-added by an administrator. La función online_pages mm/memory_hotplug.c en el kernel de Linux en versiones anteriores a v3.6 permite a usuarios locales provocar una denegación de servicio (desreferencia de puntero NULL y caída del sistema) o posiblemente tener otro impacto no especificado en determinadas circunstancias mediante el uso de memoria que fue añadida en caliente por al administrador. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=08dff7b7d629807dbb1f398c68dd9cd58dd657a1 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html http://rhn.redhat.com/errata/RHSA-2012-1580.html http://www.kernel.org/pub/linux/kernel/v3.x http://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2 http://www.openwall.com/lists/oss-security/2012/11/13/11 http://www.securityfocus.com/bid/56527 http://www.ubuntu.com/usn •
CVE-2012-4444 – kernel: net: acceptation of overlapping ipv6 fragments
https://notcve.org/view.php?id=CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. La función ip6_frag_queue en net/ipv6/reassembly.c en el kernel de Linux antes de v2.6.36 permite a atacantes remotos evitar las restricciones de red a través de la superposición de fragmentos IPv6. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.36 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=70789d7052239992824628db8133de08dc78e593 http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00000.html http://rhn.redhat.com/errata/RHSA-2012-1580.html http://www.openwall.com/lists/oss-security/2012/11/09/2 http://www.ubuntu.com/usn/USN-1660-1 http://www.ubuntu.com/usn/USN-1661-1 https://bugzilla.redhat.com/sh •
CVE-2012-4508 – kernel: ext4: AIO vs fallocate stale data exposure
https://notcve.org/view.php?id=CVE-2012-4508
Race condition in fs/ext4/extents.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from a deleted file by reading an extent that was not properly marked as uninitialized. Condición de carrera en fs/ext4/extents.c. En el kernel Linux antes de v3.4.16 permite a usuarios locales obtener información sensible de un archivo eliminado mediante la lectura de un 'extent' que no fue correctamente marcado como 'no inicializado' . • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dee1f973ca341c266229faa5a1a5bb268bed3531 http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html http://rhn.redhat.com/errata/RHSA-2012-1540.html http://rhn.redhat.com/errata/RHSA-2013-0496.html http://rhn.redhat.com/errata/RHSA-2013-1519.html http://rhn.redhat.com/errata/RHSA-2013-1783.html http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.16 http://www.openw • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •
CVE-2012-0957 – Linux Kernel 3.2.x - 'uname()' System Call Local Information Disclosure
https://notcve.org/view.php?id=CVE-2012-0957
The override_release function in kernel/sys.c in the Linux kernel before 3.4.16 allows local users to obtain sensitive information from kernel stack memory via a uname system call in conjunction with a UNAME26 personality. La función override_release en kernel/sys.c en el kernel de Linux antes de v3.4.16 permite a usuarios locales obtener información sensible de la memoria de la pila del núcleo a través de una llamada al sistema uname junto con una personalidad UNAME26. • https://www.exploit-db.com/exploits/37937 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2702b1526c7278c4d65d78de209a465d4de2885e http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html http://secunia.com/advisories/51409 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.16 http://www.openwall.com/lists/oss-security/2012/10/09/4 http://www.ubuntu.com/usn/USN-1644-1 http://www.ubuntu.com/usn/USN-1645- • CWE-16: Configuration CWE-401: Missing Release of Memory after Effective Lifetime •
CVE-2012-4565 – kernel: net: divide by zero in tcp algorithm illinois
https://notcve.org/view.php?id=CVE-2012-4565
The tcp_illinois_info function in net/ipv4/tcp_illinois.c in the Linux kernel before 3.4.19, when the net.ipv4.tcp_congestion_control illinois setting is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) by reading TCP stats. La función tcp_illinois_info en net/ipv4/tcp_illinois.c en el kernel de Linux antes de v3.4.19, cuando la opción net.ipv4.tcp_congestion_control illinois está habilitada, permite a usuarios locales provocar una denegación de servicio (división por cero y caída) mediante la lectura de estadísticas TCP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=8f363b77ee4fbf7c3bbcf5ec2c5ca482d396d664 http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091110.html http://rhn.redhat.com/errata/RHSA-2012-1580.html http://secunia.com/advisories/51409 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.4.19 http://www.openwall.com/lists/oss-security/2012/10/31/5 http://www.securityfocus.com/bid/56346 http://www.ubuntu.com/usn/USN- • CWE-189: Numeric Errors •