Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:o:linux:linux_kernel:3.10.6:*:*:*:*:*:arm64:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2013-4587 |
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. Published: December 14, 2013; 1:08:45 PM -0500 |
V3.x:(not available) V2.0: 7.2 HIGH |
CVE-2013-6672 |
Mozilla Firefox before 26.0 and SeaMonkey before 2.23 on Linux allow user-assisted remote attackers to read clipboard data by leveraging certain middle-click paste operations. Published: December 11, 2013; 10:55:13 AM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-7027 |
The ieee80211_radiotap_iterator_init function in net/wireless/radiotap.c in the Linux kernel before 3.11.7 does not check whether a frame contains any data outside of the header, which might allow attackers to cause a denial of service (buffer over-read) via a crafted header. Published: December 09, 2013; 1:55:10 PM -0500 |
V3.x:(not available) V2.0: 6.1 MEDIUM |
CVE-2013-7026 |
Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls. Published: December 09, 2013; 1:55:10 PM -0500 |
V3.x:(not available) V2.0: 4.7 MEDIUM |
CVE-2013-6432 |
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application. Published: December 09, 2013; 1:55:10 PM -0500 |
V3.x:(not available) V2.0: 4.6 MEDIUM |
CVE-2013-6431 |
The fib6_add function in net/ipv6/ip6_fib.c in the Linux kernel before 3.11.5 does not properly implement error-code encoding, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging the CAP_NET_ADMIN capability for an IPv6 SIOCADDRT ioctl call. Published: December 09, 2013; 1:55:10 PM -0500 |
V3.x:(not available) V2.0: 4.7 MEDIUM |
CVE-2013-4270 |
The net_ctl_permissions function in net/sysctl_net.c in the Linux kernel before 3.11.5 does not properly determine uid and gid values, which allows local users to bypass intended /proc/sys/net restrictions via a crafted application. Published: December 09, 2013; 1:55:09 PM -0500 |
V3.x:(not available) V2.0: 3.6 LOW |
CVE-2013-2930 |
The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application. Published: December 09, 2013; 1:55:09 PM -0500 |
V3.x:(not available) V2.0: 3.6 LOW |
CVE-2013-2929 |
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. Published: December 09, 2013; 1:55:09 PM -0500 |
V3.x:(not available) V2.0: 3.3 LOW |
CVE-2013-6383 |
The aac_compat_ioctl function in drivers/scsi/aacraid/linit.c in the Linux kernel before 3.11.8 does not require the CAP_SYS_RAWIO capability, which allows local users to bypass intended access restrictions via a crafted ioctl call. Published: November 26, 2013; 11:43:33 PM -0500 |
V3.x:(not available) V2.0: 6.9 MEDIUM |
CVE-2013-6382 |
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. Published: November 26, 2013; 11:43:33 PM -0500 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
CVE-2013-6381 |
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size. Published: November 26, 2013; 11:43:33 PM -0500 |
V3.x:(not available) V2.0: 6.9 MEDIUM |
CVE-2013-6380 |
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command. Published: November 26, 2013; 11:43:33 PM -0500 |
V3.x:(not available) V2.0: 4.7 MEDIUM |
CVE-2013-6378 |
The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation. Published: November 26, 2013; 11:43:33 PM -0500 |
V3.x:(not available) V2.0: 4.4 MEDIUM |
CVE-2013-4579 |
The ath9k_htc_set_bssid_mask function in drivers/net/wireless/ath/ath9k/htc_drv_main.c in the Linux kernel through 3.12 uses a BSSID masking approach to determine the set of MAC addresses on which a Wi-Fi device is listening, which allows remote attackers to discover the original MAC address after spoofing by sending a series of packets to MAC addresses with certain bit manipulations. Published: November 20, 2013; 8:19:41 AM -0500 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
CVE-2013-4563 |
The udp6_ufo_fragment function in net/ipv6/udp_offload.c in the Linux kernel through 3.12, when UDP Fragmentation Offload (UFO) is enabled, does not properly perform a certain size comparison before inserting a fragment header, which allows remote attackers to cause a denial of service (panic) via a large IPv6 UDP packet, as demonstrated by use of the Token Bucket Filter (TBF) queueing discipline. Published: November 20, 2013; 8:19:41 AM -0500 |
V3.x:(not available) V2.0: 7.1 HIGH |
CVE-2013-6763 |
The uio_mmap_physical function in drivers/uio/uio.c in the Linux kernel before 3.12 does not validate the size of a memory block, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via crafted mmap operations, a different vulnerability than CVE-2013-4511. Published: November 12, 2013; 9:35:12 AM -0500 |
V3.x:(not available) V2.0: 6.9 MEDIUM |
CVE-2013-4516 |
The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. Published: November 12, 2013; 9:35:12 AM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2013-4515 |
The bcm_char_ioctl function in drivers/staging/bcm/Bcmchar.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via an IOCTL_BCM_GET_DEVICE_DRIVER_INFO ioctl call. Published: November 12, 2013; 9:35:12 AM -0500 |
V3.x:(not available) V2.0: 4.9 MEDIUM |
CVE-2013-4514 |
Multiple buffer overflows in drivers/staging/wlags49_h2/wl_priv.c in the Linux kernel before 3.12 allow local users to cause a denial of service or possibly have unspecified other impact by leveraging the CAP_NET_ADMIN capability and providing a long station-name string, related to the (1) wvlan_uil_put_info and (2) wvlan_set_station_nickname functions. Published: November 12, 2013; 9:35:12 AM -0500 |
V3.x:(not available) V2.0: 4.7 MEDIUM |