CVSS: 7.8EPSS: 1%CPEs: 6EXPL: 0CVE-2013-1059 – Debian Security Advisory 2745-1
https://notcve.org/view.php?id=CVE-2013-1059
08 Jul 2013 — net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation. net/ceph/auth_none.c en el kernel de Linux hasta v3.10 permite a atacantes remotos a provocar una denegación de servicio (desreferencia de puntero NULL y caída del sistema) o posiblemente tener otros impactos no determinados a través de mens... • http://hkpco.kr/advisory/CVE-2013-1059.txt • CWE-476: NULL Pointer Dereference •
CVSS: 5.5EPSS: 0%CPEs: 254EXPL: 1CVE-2013-2234 – Kernel: net: information leak in AF_KEY notify
https://notcve.org/view.php?id=CVE-2013-2234
04 Jul 2013 — The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket. Las funciones (1) key_notify_sa_flush y (2) key_notify_policy_flush en net/key/af_key.c en el kernel de linux anterior a v3.10 no inicializa ciertos miembros de la estructura, lo que ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 5.5EPSS: 0%CPEs: 242EXPL: 1CVE-2013-2237 – Kernel: net: af_key: initialize satype in key_notify_policy_flush
https://notcve.org/view.php?id=CVE-2013-2237
04 Jul 2013 — The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket. La función key_notify_policy_flush en net/key/af_key.c en el kernel de linux anterior a v3.9 ni inicializa una cierto miembre de la estructura, lo que permite a usuarios locales obtener información sensible ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=85dfb745ee40232876663ae206cba35f24ab2a40 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 7.5EPSS: 3%CPEs: 233EXPL: 1CVE-2013-2206 – kernel: sctp: duplicate cookie handling NULL pointer dereference
https://notcve.org/view.php?id=CVE-2013-2206
04 Jul 2013 — The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic. La función sctp_sf_do_5_2_4_dupcook en net/sctp/sm_statefuns.c en la implementación SCTP en el kernel de Linux anterior a ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2815633504b442ca0b0605c16bf3d88a3a0fcea • CWE-476: NULL Pointer Dereference •
CVSS: 6.2EPSS: 0%CPEs: 254EXPL: 1CVE-2013-2232 – Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg
https://notcve.org/view.php?id=CVE-2013-2232
04 Jul 2013 — The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface. La función ip6_sk_dst_check en net/ipv6/ip6_output.c en el kernel de Linux antes de v3.10 permite a usuarios locales causar una denegación de servicios (caída del sistema) mediante el uso de un socket AF_INET6 para una conexión a una interfaz IPv4. Multiple vulnerabilities has been found and co... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a963a37d384d71ad43b3e9e79d68d42fbe0901f3 • CWE-20: Improper Input Validation •
CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0CVE-2013-1943 – kernel: kvm: missing check in kvm_set_memory_region()
https://notcve.org/view.php?id=CVE-2013-1943
11 Jun 2013 — The KVM subsystem in the Linux kernel before 3.0 does not check whether kernel addresses are specified during allocation of memory slots for use in a guest's physical address space, which allows local users to gain privileges or obtain sensitive information from kernel memory via a crafted application, related to arch/x86/kvm/paging_tmpl.h and virt/kvm/kvm_main.c. El subsistema KVM en el kernel de Linux anterior a v3.0 no comprueba si las direcciones del núcleo se especifican durante la asignación de slots ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=fa3d315a4ce2c0891cdde262562e710d95fba19e • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 5.5EPSS: 0%CPEs: 6EXPL: 0CVE-2011-4098
https://notcve.org/view.php?id=CVE-2011-4098
08 Jun 2013 — The fallocate implementation in the GFS2 filesystem in the Linux kernel before 3.2 relies on the page cache, which might allow local users to cause a denial of service by preallocating blocks in certain situations involving insufficient memory. La implementación de fallocate en el sistema de ficheros GFS2 de los kernel Linux anteriores a v3.2 confía en la caché, pudiendo permitir a usuarios locales provocar una denegación de servicio mediante la pre-asignación de bloques que suponen ciertas situaciones de m... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=64dd153c83743af81f20924c6343652d731eeecb • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0CVE-2013-2128 – Kernel: net: oops from tcp_collapse() when using splice(2)
https://notcve.org/view.php?id=CVE-2013-2128
07 Jun 2013 — The tcp_read_sock function in net/ipv4/tcp.c in the Linux kernel before 2.6.34 does not properly manage skb consumption, which allows local users to cause a denial of service (system crash) via a crafted splice system call for a TCP socket. La función tcp_read_sock en net/ipv4/tcp.c del kernel de Linux antes de v2.6.34 no gestiona correctamente el consumo skb, lo que permite a usuarios locales causar una denegación de servicios (caída del sistema) a través de la llamada al sistema manipulada splice para un ... • http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.34 • CWE-400: Uncontrolled Resource Consumption •
CVSS: 7.5EPSS: 0%CPEs: 13EXPL: 0CVE-2013-2147 – Kernel: cpqarray/cciss: information leak via ioctl
https://notcve.org/view.php?id=CVE-2013-2147
07 Jun 2013 — The HP Smart Array controller disk-array driver and Compaq SMART2 controller disk-array driver in the Linux kernel through 3.9.4 do not initialize certain data structures, which allows local users to obtain sensitive information from kernel memory via (1) a crafted IDAGETPCIINFO command for a /dev/ida device, related to the ida_locked_ioctl function in drivers/block/cpqarray.c or (2) a crafted CCISS_PASSTHRU32 command for a /dev/cciss device, related to the cciss_ioctl32_passthru function in drivers/block/c... • http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00020.html • CWE-399: Resource Management Errors •
CVSS: 5.5EPSS: 0%CPEs: 12EXPL: 0CVE-2013-2148 – Kernel: fanotify: info leak in copy_event_to_user
https://notcve.org/view.php?id=CVE-2013-2148
07 Jun 2013 — The fill_event_metadata function in fs/notify/fanotify/fanotify_user.c in the Linux kernel through 3.9.4 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory via a read operation on the fanotify descriptor. La función fill_event_metadata en fs/notify/fanotify/fanotify_user.c en Linux kernel hasta v3.9.4 no inicializa determinadas estructuras, lo que permite a atacantes locales obtener información sensible desde la memoria del kernel a tr... • http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-399: Resource Management Errors •
