Show filters
45 Total Results
Displaying 41-45 of 45
Sort by:
Attacker Value
Unknown
CVE-2013-2058
Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter.
0
Attacker Value
Unknown
CVE-2013-4470
Disclosure Date: November 04, 2013 (last updated October 05, 2023)
The Linux kernel before 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly initialize certain data structures, which allows local users to cause a denial of service (memory corruption and system crash) or possibly gain privileges via a crafted application that uses the UDP_CORK option in a setsockopt system call and sends both short and long packets, related to the ip_ufo_append_data function in net/ipv4/ip_output.c and the ip6_ufo_append_data function in net/ipv6/ip6_output.c.
0
Attacker Value
Unknown
CVE-2013-4299
Disclosure Date: October 24, 2013 (last updated October 05, 2023)
Interpretation conflict in drivers/md/dm-snap-persistent.c in the Linux kernel through 3.11.6 allows remote authenticated users to obtain sensitive information or modify data via a crafted mapping to a snapshot block device.
0
Attacker Value
Unknown
CVE-2013-4387
Disclosure Date: October 10, 2013 (last updated October 05, 2023)
net/ipv6/ip6_output.c in the Linux kernel through 3.11.4 does not properly determine the need for UDP Fragmentation Offload (UFO) processing of small packets after the UFO queueing of a large packet, which allows remote attackers to cause a denial of service (memory corruption and system crash) or possibly have unspecified other impact via network traffic that triggers a large response packet.
0
Attacker Value
Unknown
CVE-2013-4345
Disclosure Date: October 10, 2013 (last updated October 05, 2023)
Off-by-one error in the get_prng_bytes function in crypto/ansi_cprng.c in the Linux kernel through 3.11.4 makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via multiple requests for small amounts of data, leading to improper management of the state of the consumed data.
0