![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-5634
https://notcve.org/view.php?id=CVE-2013-5634
25 Sep 2013 — arch/arm/kvm/arm.c in the Linux kernel before 3.10 on the ARM platform, when KVM is used, allows host OS users to cause a denial of service (NULL pointer dereference, OOPS, and host OS crash) or possibly have unspecified other impact by omitting vCPU initialization before a KVM_GET_REG_LIST ioctl call. arch/arm/kvm/arm.c en el kernel de Linux anterior a v3.10 en la plataforma ARM, cuando KVM es utilizado, permite a los usuarios del sistema operativo anfitrión provocar una denegación de servicio (referencia ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=e8180dcaa8470ceca21109f143876fdcd9fe050a • CWE-399: Resource Management Errors •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-4343 – Kernel: net: use-after-free TUNSETIFF
https://notcve.org/view.php?id=CVE-2013-4343
25 Sep 2013 — Use-after-free vulnerability in drivers/net/tun.c in the Linux kernel through 3.11.1 allows local users to gain privileges by leveraging the CAP_NET_ADMIN capability and providing an invalid tuntap interface name in a TUNSETIFF ioctl call. Vulnerabilidad de uso despues de liberación en drivers/net/tun.c en el kernel Linux 3.11.1 permite a usuarios locales obtener privilegios aprovechado CAP_NET_ADMIN e introduciendo un nombre de interfaz tuntap inválido en una llamada TUNSETIFF ioctl. The kernel-rt packages... • http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00071.html • CWE-399: Resource Management Errors CWE-416: Use After Free •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-4300 – Ubuntu Security Notice USN-1998-1
https://notcve.org/view.php?id=CVE-2013-4300
25 Sep 2013 — The scm_check_creds function in net/core/scm.c in the Linux kernel before 3.11 performs a capability check in an incorrect namespace, which allows local users to gain privileges via PID spoofing. La función scm_check_creds en net/core/scm.c en el kernel de Linux anterior a la versión 3.11 realiza una comprobación de la capacidad en un espacio de nombres incorrecto, lo que permite a usuarios locales obtener privilegios a través de PID spoofing. An information leak was discovered in the Linux kernel when read... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=d661684cf6820331feae71146c35da83d794467e • CWE-264: Permissions, Privileges, and Access Controls •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2058 – Kernel: usb: chipidea: Allow disabling streaming not just in udc mode
https://notcve.org/view.php?id=CVE-2013-2058
16 Sep 2013 — The host_start function in drivers/usb/chipidea/host.c in the Linux kernel before 3.7.4 does not properly support a certain non-streaming option, which allows local users to cause a denial of service (system crash) by sending a large amount of network traffic through a USB/Ethernet adapter. La función host_start en drivers/usb/Chipidea/host.c en el kernel de Linux anterior a la versión 3.7.4 no soporta adecuadamente una determinada opción no-streaming, que permite a usuarios locales provocar una denegación ... • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=929473ea05db455ad88cdc081f2adc556b8dc48f • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2891
https://notcve.org/view.php?id=CVE-2013-2891
13 Sep 2013 — drivers/hid/hid-steelseries.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_STEELSERIES is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. drivers/hid/hid-steelseries.c en el subsistema Human Interface Device (HID) del kernel Linux hasta 3.11, cuando CONFIG_HID_STEELSERIES está activado, permite a atacantes con acceso físico causar una denegación de servicio (escritura fuera d... • http://marc.info/?l=linux-input&m=137772184614622&w=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2897 – Ubuntu Security Notice USN-2023-1
https://notcve.org/view.php?id=CVE-2013-2897
13 Sep 2013 — Multiple array index errors in drivers/hid/hid-multitouch.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_MULTITOUCH is enabled, allow physically proximate attackers to cause a denial of service (heap memory corruption, or NULL pointer dereference and OOPS) via a crafted device. Múltiples errores de indexación en el arrary en drivers/hid/hid-multitouch.c en el subsistema Human Interface Device (HID) en el kernel de Linux desde la versión 3.11, cuando está ac... • http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00010.html • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2889 – Kernel: HID: zeroplus: heap overflow flaw
https://notcve.org/view.php?id=CVE-2013-2889
13 Sep 2013 — drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. drivers/hid/hid-zpff.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta la versión 3.11, cuando CONFIG_HID_ZEROPLUS está habilitado, permite físicamente a atacantes próximos causar una denegación de servicio (escritura fuera de... • http://marc.info/?l=linux-input&m=137772182014614&w=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2898 – Ubuntu Security Notice USN-1998-1
https://notcve.org/view.php?id=CVE-2013-2898
13 Sep 2013 — drivers/hid/hid-sensor-hub.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_SENSOR_HUB is enabled, allows physically proximate attackers to obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-sensor-hub.c en el subsistema Human Interface Device (HID) en el kernel de Linux hasta la v3.11, cuando CONFIG_HID_SENSOR_HUB es activado, permite a atacantes físicamente próximos obtener información sensible de la memoria del núcleo a t... • http://marc.info/?l=linux-input&m=137772191114645&w=1 • CWE-20: Improper Input Validation •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2895 – Kernel: HID: logitech-dj: heap overflow flaw
https://notcve.org/view.php?id=CVE-2013-2895
13 Sep 2013 — drivers/hid/hid-logitech-dj.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_LOGITECH_DJ is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) or obtain sensitive information from kernel memory via a crafted device. drivers/hid/hid-logitech-dj.c en el subsistema Human Interface Device (HID) del kernel de Linux hasta v3.11, cuando CONFIG_HID_LOGITECH_DJ está activo, permite atacantes físicamente próx... • http://marc.info/?l=linux-input&m=137772188314631&w=1 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-122: Heap-based Buffer Overflow •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2013-2896 – Kernel: HID: ntrig: NULL pointer dereference
https://notcve.org/view.php?id=CVE-2013-2896
13 Sep 2013 — drivers/hid/hid-ntrig.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_NTRIG is enabled, allows physically proximate attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted device. drivers/hid/hid-ntrig.c en el subsistema Human Interface Device (HID) del kernel Linux hasta 3.11, cuando CONFIG_HID_NTRIG es activado, permite a atacantes con acceso físico causar una denegación de servicio (referencia a puntero nulo y OOPS) a trav... • http://marc.info/?l=linux-input&m=137772189314633&w=1 • CWE-476: NULL Pointer Dereference •