CVE-2013-2164 – Kernel: information leak in cdrom driver
https://notcve.org/view.php?id=CVE-2013-2164
The mmc_ioctl_cdrom_read_data function in drivers/cdrom/cdrom.c in the Linux kernel through 3.10 allows local users to obtain sensitive information from kernel memory via a read operation on a malfunctioning CD-ROM drive. La función mmc_ioctl_cdrom_read_data en drivers/cdrom/cdrom.c en el kernel de Linux hasta v3.10 permite a usuarios locales obtener información sensible de la memoria del kernel a través de operaciones de lectura en una unidad de CD-ROM que no funcione correctamente • http://git.kernel.org/cgit/linux/kernel/git/next/linux-next.git/commit/drivers/cdrom/cdrom.c?id=050e4b8fb7cdd7096c987a9cd556029c622c7fe2 http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1166.html http://rhn.redhat.com/errata/RHSA-2013-1645.html http://www.debian.org/security/2013/dsa-2766 h • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2013-2237 – Kernel: net: af_key: initialize satype in key_notify_policy_flush
https://notcve.org/view.php?id=CVE-2013-2237
The key_notify_policy_flush function in net/key/af_key.c in the Linux kernel before 3.9 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify_policy interface of an IPSec key_socket. La función key_notify_policy_flush en net/key/af_key.c en el kernel de linux anterior a v3.9 ni inicializa una cierto miembre de la estructura, lo que permite a usuarios locales obtener información sensible de la memoria de tipo montículo del kernel leyendo un mensaje de difusión de la interfaz notify_policy de un key_socket IPSec • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=85dfb745ee40232876663ae206cba35f24ab2a40 http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1166.html http://rhn.redhat.com/errata/RHSA-2013-1173.html http://www.debian.org/security/2013/dsa-2766 http://www • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-2232 – Kernel: ipv6: using ipv4 vs ipv6 structure during routing lookup in sendmsg
https://notcve.org/view.php?id=CVE-2013-2232
The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface. La función ip6_sk_dst_check en net/ipv6/ip6_output.c en el kernel de Linux antes de v3.10 permite a usuarios locales causar una denegación de servicios (caída del sistema) mediante el uso de un socket AF_INET6 para una conexión a una interfaz IPv4. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a963a37d384d71ad43b3e9e79d68d42fbe0901f3 http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1166.html http://rhn.redhat.com/errata/RHSA-2013-1173.html http://www.debian.org/security/2013/dsa-2766 http://www • CWE-20: Improper Input Validation •
CVE-2013-2234 – Kernel: net: information leak in AF_KEY notify
https://notcve.org/view.php?id=CVE-2013-2234
The (1) key_notify_sa_flush and (2) key_notify_policy_flush functions in net/key/af_key.c in the Linux kernel before 3.10 do not initialize certain structure members, which allows local users to obtain sensitive information from kernel heap memory by reading a broadcast message from the notify interface of an IPSec key_socket. Las funciones (1) key_notify_sa_flush y (2) key_notify_policy_flush en net/key/af_key.c en el kernel de linux anterior a v3.10 no inicializa ciertos miembros de la estructura, lo que permite a usuarios locales obtener información sensible de la memoria de tipo montículo del kernel leyendo un mensaje de difusión de la interfaz de notificación de un key_socket IPSec. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a5cc68f3d63306d0d288f31edfc2ae6ef8ecd887 http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com/errata/RHSA-2013-1166.html http://rhn.redhat.com/errata/RHSA-2013-1645.html http://www.debian.org/security/2013/dsa-2766 http://www • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2013-2206 – kernel: sctp: duplicate cookie handling NULL pointer dereference
https://notcve.org/view.php?id=CVE-2013-2206
The sctp_sf_do_5_2_4_dupcook function in net/sctp/sm_statefuns.c in the SCTP implementation in the Linux kernel before 3.8.5 does not properly handle associations during the processing of a duplicate COOKIE ECHO chunk, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via crafted SCTP traffic. La función sctp_sf_do_5_2_4_dupcook en net/sctp/sm_statefuns.c en la implementación SCTP en el kernel de Linux anterior a v3.8.5 no maneja correctamente asociaciones durante el proceso de duplicación de COOKIE ECHO chunk, lo que permite a atacantes remotos causar una denegación de servicios (puntero NULL y caída del sistema) o posiblemente tenga otro impacto sin especificar a través de tráfico SCTP. • http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=f2815633504b442ca0b0605c16bf3d88a3a0fcea http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00020.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00021.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00023.html http://lists.opensuse.org/opensuse-security-announce/2013-11/msg00024.html http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html http://rhn.redhat.com • CWE-476: NULL Pointer Dereference •