Show filters
86 Total Results
Displaying 31-40 of 86
Sort by:
Attacker Value
Unknown
CVE-2013-4514
Disclosure Date: November 12, 2013 (last updated October 05, 2023)
Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions.
0
Attacker Value
Unknown
CVE-2013-4515
Disclosure Date: November 12, 2013 (last updated October 05, 2023)
The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call.
0
Attacker Value
Unknown
CVE-2013-4513
Disclosure Date: November 12, 2013 (last updated October 05, 2023)
Buffer overflow in the oz_cdev_write function in drivers/staging/ozwpan/ozcdev.c in the Linux kernel before 3.12 allows local users to cause a denial of service or possibly have unspecified other impact via a crafted write operation.
0
Attacker Value
Unknown
CVE-2013-4483
Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
0
Attacker Value
Unknown
CVE-2013-2058
Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter.
0
Attacker Value
Unknown
CVE-2013-4470
Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
0
Attacker Value
Unknown
CVE-2013-4299
Disclosure Date: October 24, 2013 (last updated October 05, 2023)
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
0
Attacker Value
Unknown
CVE-2013-4387
Disclosure Date: October 10, 2013 (last updated October 05, 2023)
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
0
Attacker Value
Unknown
CVE-2013-4345
Disclosure Date: October 10, 2013 (last updated October 05, 2023)
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
0
Attacker Value
Unknown
CVE-2013-4350
Disclosure Date: September 25, 2013 (last updated October 05, 2023)
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
0