Show filters
66 Total Results
Displaying 61-66 of 66
Sort by:
Attacker Value
Unknown
CVE-2013-2164
Disclosure Date: July 04, 2013 (last updated October 05, 2023)
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive.
0
Attacker Value
Unknown
CVE-2013-2237
Disclosure Date: July 04, 2013 (last updated October 05, 2023)
The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket.
0
Attacker Value
Unknown
CVE-2013-2141
Disclosure Date: June 07, 2013 (last updated October 05, 2023)
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
0
Attacker Value
Unknown
CVE-2013-2146
Disclosure Date: June 07, 2013 (last updated October 05, 2023)
arch/x86/kernel/cpu/perf_event_intel.c in the Linux kernel before 3.8.9, when the Performance Events Subsystem is enabled, specifies an incorrect bitmask, which allows local users to cause a denial of service (general protection fault and system crash) by attempting to set a reserved bit.
0
Attacker Value
Unknown
CVE-2013-1979
Disclosure Date: May 03, 2013 (last updated October 05, 2023)
The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
0
Attacker Value
Unknown
CVE-2013-1959
Disclosure Date: May 03, 2013 (last updated October 05, 2023)
kernel/user_namespace.c in the Linux kernel before 3.8.9 does not have appropriate capability requirements for the uid_map and gid_map files, which allows local users to gain privileges by opening a file within an unprivileged process and then modifying the file within a privileged process.
0