CVE-2011-2723 – kernel: gro: only reset frag0 when skb can be pulled
https://notcve.org/view.php?id=CVE-2011-2723
The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic. La función skb_gro_header_slow en includelinuxnetdevice.h en kernel de Linux anteriores a v2.6.39.4, cuando está activada la opción Generic Receive Offload (GRO), reinicia ciertos campos en situaciones incorrectas, lo que permite producir una denegación de servicio (caída del sistema) mediante una tráfico de red manipulado. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17dd759c67f21e34f2156abcf415e1f60605a188 http://marc.info/?l=bugtraq&m=139447903326211&w=2 http://openwall.com/lists/oss-security/2011/07/28/13 http://openwall.com/lists/oss-security/2011/07/29/1 http://securitytracker.com/id?1025876 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 http://www.redhat.com/support/errata/RHSA-2011-1321.html http://www.securityfocus.com/bid • CWE-20: Improper Input Validation •
CVE-2011-2700
https://notcve.org/view.php?id=CVE-2011-2700
Multiple buffer overflows in the si4713_write_econtrol_string function in drivers/media/radio/si4713-i2c.c in the Linux kernel before 2.6.39.4 on the N900 platform might allow local users to cause a denial of service or have unspecified other impact via a crafted s_ext_ctrls operation with a (1) V4L2_CID_RDS_TX_PS_NAME or (2) V4L2_CID_RDS_TX_RADIO_TEXT control ID. Múltiples desbordamientos de búfer en la anteriores a v2.6.39.4 en la plataforma N900, permite a atacantes remotos provocar una denegación de servicio u otro impacto no determinado a través de operaciones s_ext_ctrls manipuladas con un control ID V4L2_CID_RDS_TX_PS_NAME o (2) V4L2_CID_RDS_TX_RADIO_TEXT • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=dc6b845044ccb7e9e6f3b7e71bd179b3cf0223b6 http://openwall.com/lists/oss-security/2011/07/20/4 http://openwall.com/lists/oss-security/2011/07/20/6 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 http://www.securityfocus.com/bid/48804 http://xorl.wordpress.com/2011/07/24/cve-2011-2700-linux-kernel-si4713-i2c-buffer-overflow • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2011-2918 – Linux Kernel 3.0.0 - 'perf_count_sw_cpu_clock' event Denial of Service
https://notcve.org/view.php?id=CVE-2011-2918
The Performance Events subsystem in the Linux kernel before 3.1 does not properly handle event overflows associated with PERF_COUNT_SW_CPU_CLOCK events, which allows local users to cause a denial of service (system hang) via a crafted application. El subsistema Performance Events en el kernel de Linux antes de v3.1 no trata correctamente los desbordamientos de eventos asociados con eventos PERF_COUNT_SW_CPU_CLOCK, lo que permite a usuarios locales causar una denegación de servicio (bloqueo del sistema) a través de una aplicación modificada. • https://www.exploit-db.com/exploits/17769 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a8b0ca17b80e92faab46ee7179ba9e99ccb61233 http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 http://www.openwall.com/lists/oss-security/2011/08/16/1 https://bugzilla.redhat.com/show_bug.cgi?id=730706 https://github.com/torvalds/linux/commit/a8b0ca17b80e92faab46ee7179ba9e99ccb61233 https://access.redhat.com/security/cve/CVE-2011-2918 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-2491 – kernel: rpc task leak after flock()ing NFS share
https://notcve.org/view.php?id=CVE-2011-2491
The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call. La implementación del protocolo Network Lock Manager (NLM) en la funcionalidad de cliente NFS en el kernel de Linux anteriores a v3.0 permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una llamada de sistema flock LOCK_UN. • http://ftp.osuosl.org/pub/linux/kernel/v3.0/ChangeLog-3.0 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0b760113a3a155269a3fba93a409c640031dd68f http://rhn.redhat.com/errata/RHSA-2011-1212.html http://www.openwall.com/lists/oss-security/2011/06/23/6 https://bugzilla.redhat.com/show_bug.cgi?id=709393 https://github.com/torvalds/linux/commit/0b760113a3a155269a3fba93a409c640031dd68f https://access.redhat.com/security/cve/CVE-2011-2491 • CWE-400: Uncontrolled Resource Consumption •
CVE-2011-2517 – kernel: nl80211: missing check for valid SSID size in scan operations
https://notcve.org/view.php?id=CVE-2011-2517
Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value. Múltiples desbordamientos de búfer en net/wireless/nl80211.c en el kernel de Linux antes de v2.6.39.2 permite a usuarios locales obtener privilegios mediante el aprovechamiento de la capacidad CAP_NET_ADMIN durante las operaciones de exploración con un valor de SSID de largo. • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=208c72f4fe44fe09577e7975ba0e7fa0278f3d03 http://rhn.redhat.com/errata/RHSA-2011-1212.html http://www.openwall.com/lists/oss-security/2011/07/01/4 https://bugzilla.redhat.com/show_bug.cgi?id=718152 https://github.com/torvalds/linux/commit/208c72f4fe44fe09577e7975ba0e7fa0278f3d03 https://access.redhat.com/security/cve/CVE-2011-2517 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •