Show filters
87 Total Results
Displaying 71-80 of 87
Sort by:
Attacker Value
Unknown
CVE-2013-1956
Disclosure Date: April 24, 2013 (last updated October 05, 2023)
The create_user_ns function in kernel/user_namespace.c in the Linux kernel before 3.8.6 does not check whether a chroot directory exists that differs from the namespace root directory, which allows local users to bypass intended filesystem restrictions via a crafted clone system call.
0
Attacker Value
Unknown
CVE-2013-1958
Disclosure Date: April 24, 2013 (last updated October 05, 2023)
The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.8.6 does not properly enforce capability requirements for controlling the PID value associated with a UNIX domain socket, which allows local users to bypass intended access restrictions by leveraging the time interval during which a user namespace has been created but a PID namespace has not been created.
0
Attacker Value
Unknown
CVE-2013-1858
Disclosure Date: April 05, 2013 (last updated October 05, 2023)
The clone system-call implementation in the Linux kernel before 3.8.3 does not properly handle a combination of the CLONE_NEWUSER and CLONE_FS flags, which allows local users to gain privileges by calling chroot and leveraging the sharing of the / directory between a parent process and a child process.
0
Attacker Value
Unknown
CVE-2013-0914
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
0
Attacker Value
Unknown
CVE-2013-1848
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
fs/ext3/super.c in the Linux kernel before 3.8.4 uses incorrect arguments to functions in certain circumstances related to printk input, which allows local users to conduct format-string attacks and possibly gain privileges via a crafted application.
0
Attacker Value
Unknown
CVE-2013-1797
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
Use-after-free vulnerability in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 allows guest OS users to cause a denial of service (host OS memory corruption) or possibly have unspecified other impact via a crafted application that triggers use of a guest physical address (GPA) in (1) movable or (2) removable memory during an MSR_KVM_SYSTEM_TIME kvm_set_msr_common operation.
0
Attacker Value
Unknown
CVE-2013-1796
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
The kvm_set_msr_common function in arch/x86/kvm/x86.c in the Linux kernel through 3.8.4 does not ensure a required time_page alignment during an MSR_KVM_SYSTEM_TIME operation, which allows guest OS users to cause a denial of service (buffer overflow and host OS memory corruption) or possibly have unspecified other impact via a crafted application.
0
Attacker Value
Unknown
CVE-2013-2636
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
net/bridge/br_mdb.c in the Linux kernel before 3.8.4 does not initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application.
0
Attacker Value
Unknown
CVE-2013-1792
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
Race condition in the install_user_keyrings function in security/keys/process_keys.c in the Linux kernel before 3.8.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) via crafted keyctl system calls that trigger keyring operations in simultaneous threads.
0
Attacker Value
Unknown
CVE-2013-2635
Disclosure Date: March 22, 2013 (last updated October 05, 2023)
The rtnl_fill_ifinfo function in net/core/rtnetlink.c in the Linux kernel before 3.8.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel stack memory via a crafted application.
0