CVE-2008-3526 – Linux kernel sctp_setsockopt_auth_key() integer overflow
https://notcve.org/view.php?id=CVE-2008-3526
Integer overflow in the sctp_setsockopt_auth_key function in net/sctp/socket.c in the Stream Control Transmission Protocol (sctp) implementation in the Linux kernel 2.6.24-rc1 through 2.6.26.3 allows remote attackers to cause a denial of service (panic) or possibly have unspecified other impact via a crafted sca_keylength field associated with the SCTP_AUTH_KEY option. Desbordamiento de entero en la función sctp_setsockopt_auth_key de net/sctp/socket.c en la implementación Stream Control Transmission Protocol (sctp) del kernel de Linux de 2.6.24-rc1 a 2.6.26.3 permite a atacantes remotos provocar una denegación de servicio (pánico) o posiblemente tener otro impacto no especificado mediante un campo sca_keylength manipulado asociado con la opción SCTP_AUTH_KEY. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=30c2235cbc477d4629983d440cdc4f496fec9246 http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00010.html http://secunia.com/advisories/31881 http://secunia.com/advisories/32190 http://secunia.com/advisories/32393 http://www.debian.org/security/2008/dsa-1636 http://www.mandriva.com/security/advisories?name=MDVSA-2008:223 http://www.openwall.com/lists/oss-security/2008/08/26/9 http://ww • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2008-3276 – Linux kernel dccp_setsockopt_change() integer overflow
https://notcve.org/view.php?id=CVE-2008-3276
Integer overflow in the dccp_setsockopt_change function in net/dccp/proto.c in the Datagram Congestion Control Protocol (DCCP) subsystem in the Linux kernel 2.6.17-rc1 through 2.6.26.2 allows remote attackers to cause a denial of service (panic) via a crafted integer value, related to Change L and Change R options without at least one byte in the dccpsf_val field. Desbordamiento de entero en la función dccp_setsockopt_change de net/dccp/proto.c en el subsistema Datagram Congestion Control Protocol (DCCP (Protocolo de Control de Congestión de Datagramas)) del kernel de Linux de 2.6.17-rc1 a 2.6.26.2 permite a atacantes remotos provocar una denegación de servicio (pánico) mediante un valor de entero manipulado, relacionado con opciones Change L y Change R que no tienen al menos un byte en el campo dccpsf_val. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=3e8a0a559c66ee9e7468195691a56fefc3589740 http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00008.html http://secunia.com/advisories/31509 http://secunia.com/advisories/31836 http://secunia.com/advisories/31881 http://secunia.com/advisories/32190 http://secunia.com/advisories/32237 http://secunia.com/advisories/32370 http://secunia.com/advisories/32393 http://secunia.com/advisories/32485 http& • CWE-189: Numeric Errors CWE-190: Integer Overflow or Wraparound •
CVE-2008-3686
https://notcve.org/view.php?id=CVE-2008-3686
The rt6_fill_node function in net/ipv6/route.c in Linux kernel 2.6.26-rc4, 2.6.26.2, and possibly other 2.6.26 versions, allows local users to cause a denial of service (kernel OOPS) via IPv6 requests when no IPv6 input device is in use, which triggers a NULL pointer dereference. La función rt6_fill_node en el archivo net/ipv6/route.c en el kernel de Linux versiones 2.6.26-rc4, 2.6.26.2, y posiblemente otras versiones 2.6.26, permite a los usuarios locales causar una denegación de servicio (OOPS del kernel) por medio de peticiones IPv6 cuando no está en uso un dispositivo de entrada IPv6, lo que desencadena una desreferencia del puntero NULL. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=5e0115e500fe9dd2ca11e6f92db9123204f1327a http://lkml.org/lkml/2008/8/7/230 http://lkml.org/lkml/2008/8/8/7 http://secunia.com/advisories/31579 http://www.vupen.com/english/advisories/2008/2422 https://exchange.xforce.ibmcloud.com/vulnerabilities/44605 • CWE-399: Resource Management Errors •
CVE-2008-3275 – Linux kernel local filesystem DoS
https://notcve.org/view.php?id=CVE-2008-3275
The (1) real_lookup and (2) __lookup_hash functions in fs/namei.c in the vfs implementation in the Linux kernel before 2.6.25.15 do not prevent creation of a child dentry for a deleted (aka S_DEAD) directory, which allows local users to cause a denial of service ("overflow" of the UBIFS orphan area) via a series of attempted file creations within deleted directories. Las funciones (1) real_lookup y (2) __lookup_hash en el archivo fs/namei.c en la implementación de vfs en el kernel de Linux anterior a versión 2.6.25.15 no previene la creación de una matriz de elementos secundarios para un directorio eliminado (también se conoce como S_DEAD), que permite a los usuarios locales causar una denegación de servicio ("overflow" del área huérfana UBIFS) por medio de una serie de intentos de creación de archivos sin eliminar los directorios. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d70b67c8bc72ee23b55381bd6a884f4796692f77 http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.15 http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00003.html http://lkml.org/lkml/2008/7/2/83 http://secunia.com/advisories/31551 http://secunia.com/advisories/31614 http://secunia.com/advisories/31836 http:/ • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2008-3534 – kernel: tmpfs: fix kernel BUG in shmem_delete_inode
https://notcve.org/view.php?id=CVE-2008-3534
The shmem_delete_inode function in mm/shmem.c in the tmpfs implementation in the Linux kernel before 2.6.26.1 allows local users to cause a denial of service (system crash) via a certain sequence of file create, remove, and overwrite operations, as demonstrated by the insserv program, related to allocation of "useless pages" and improper maintenance of the i_blocks count. La función shmem_delete_inode de mm/shmem.c en la implementación the tmpfs de Linux kernel versiones anteriores a 2.6.26.1 permite a usuarios locales provocar una denegación de servicio (caída del sistema) a través de una determinada secuencia de operaciones de ficheros de crear, eliminar y sobrescribir, como lo demostrador por el programa insserv, relacionado con la asignación de "páginas sin uso" y mantenimiento inadecuado de la cuenta i_blocks. • http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.26.y.git%3Ba=commit%3Bh=14fcc23fdc78e9d32372553ccf21758a9bd56fa1 http://lkml.org/lkml/2008/7/26/71 http://secunia.com/advisories/31881 http://secunia.com/advisories/32190 http://secunia.com/advisories/32393 http://www.debian.org/security/2008/dsa-1636 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.1 http://www.redhat.com/support/errata/RHSA-2008-0857.html http://www.securityfocus.com/bid • CWE-400: Uncontrolled Resource Consumption •