Show filters
125 Total Results
Displaying 41-50 of 125
Sort by:
Attacker Value
Unknown

CVE-2013-4483

Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.
0
Attacker Value
Unknown

CVE-2013-2058

Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter.
0
Attacker Value
Unknown

CVE-2013-4470

Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
0
Attacker Value
Unknown

CVE-2013-4299

Disclosure Date: October 24, 2013 (last updated October 05, 2023)
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
0
Attacker Value
Unknown

CVE-2013-4387

Disclosure Date: October 10, 2013 (last updated October 05, 2023)
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
0
Attacker Value
Unknown

CVE-2013-4345

Disclosure Date: October 10, 2013 (last updated October 05, 2023)
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
0
Attacker Value
Unknown

CVE-2013-4350

Disclosure Date: September 25, 2013 (last updated October 05, 2023)
The IPv6 SCTP implementation in net/sctp/ipv6.c in the Linux kernel through 3.11.1 uses data structures and function calls that do not trigger an intended configuration of IPsec encryption, which allows remote attackers to obtain sensitive information by sniffing the network.
0
Attacker Value
Unknown

CVE-2013-2140

Disclosure Date: September 25, 2013 (last updated October 05, 2023)
The dispatch_discard_io function in drivers/block/xen-blkback/blkback.c in the Xen blkback implementation in the Linux kernel before 3.10.5 allows guest OS users to cause a denial of service (data loss) via filesystem write operations on a read-only disk that supports the (1) BLKIF_OP_DISCARD (aka discard or TRIM) or (2) SCSI UNMAP feature.
0
Attacker Value
Unknown

CVE-2013-2890

Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-sony.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SONY is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
0
Attacker Value
Unknown

CVE-2013-2897

Disclosure Date: September 16, 2013 (last updated October 05, 2023)
Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device.
0