Show filters
120 Total Results
Displaying 51-60 of 120
Sort by:
Attacker Value
Unknown
CVE-2013-2893
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
The Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_LOGITECH_FF, CONFIG_LOGIG940_FF, or CONFIG_LOGIWHEELS_FF is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device, related to (1) drivers/hid/hid-lgff.c, (2) drivers/hid/hid-lg3ff.c, and (3) drivers/hid/hid-lg4ff.c.
0
Attacker Value
Unknown
CVE-2013-2895
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device.
0
Attacker Value
Unknown
CVE-2013-2896
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device.
0
Attacker Value
Unknown
CVE-2013-2894
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-lenovo-tpkbd.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LENOVO_TPKBD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
0
Attacker Value
Unknown
CVE-2013-2898
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device.
0
Attacker Value
Unknown
CVE-2013-2892
Disclosure Date: September 16, 2013 (last updated October 05, 2023)
drivers/hid/hid-pl.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_PANTHERLORD is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device.
0
Attacker Value
Unknown
CVE-2013-4205
Disclosure Date: August 25, 2013 (last updated October 05, 2023)
Memory leak in the unshare_userns function in kernel/user_namespace.c in the Linux kernel before 3.10.6 allows local users to cause a denial of service (memory consumption) via an invalid CLONE_NEWUSER unshare call.
0
Attacker Value
Unknown
CVE-2013-4129
Disclosure Date: July 29, 2013 (last updated October 05, 2023)
The bridge multicast implementation in the Linux kernel through 3.10.3 does not check whether a certain timer is armed before modifying the timeout value of that timer, which allows local users to cause a denial of service (BUG and system crash) via vectors involving the shutdown of a KVM virtual machine, related to net/bridge/br_mdb.c and net/bridge/br_multicast.c.
0
Attacker Value
Unknown
CVE-2013-4163
Disclosure Date: July 29, 2013 (last updated October 05, 2023)
The ip6_append_data_mtu function in net/ipv6/ip6_output.c in the IPv6 implementation in the Linux kernel through 3.10.3 does not properly maintain information about whether the IPV6_MTU setsockopt option had been specified, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
0
Attacker Value
Unknown
CVE-2013-4162
Disclosure Date: July 29, 2013 (last updated October 05, 2023)
The udp_v6_push_pending_frames function in net/ipv6/udp.c in the IPv6 implementation in the Linux kernel through 3.10.3 makes an incorrect function call for pending data, which allows local users to cause a denial of service (BUG and system crash) via a crafted application that uses the UDP_CORK option in a setsockopt system call.
0