Max CVSS | 4.9 | Min CVSS | 1.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2013-1929 | 4.4 |
Heap-based buffer overflow in the tg3_read_vpd function in drivers/net/ethernet/broadcom/tg3.c in the Linux kernel before 3.8.6 allows physically proximate attackers to cause a denial of service (system crash) or possibly execute arbitrary code via c
|
13-02-2023 - 04:42 | 07-06-2013 - 14:03 | |
CVE-2012-6545 | 1.9 |
The Bluetooth RFCOMM implementation in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel memory via a crafted application. Per https://access.redhat.com/s
|
22-04-2019 - 17:48 | 15-03-2013 - 20:55 | |
CVE-2012-6544 | 1.9 |
The Bluetooth protocol stack in the Linux kernel before 3.6 does not properly initialize certain structures, which allows local users to obtain sensitive information from kernel stack memory via a crafted application that targets the (1) L2CAP or (2)
|
22-04-2019 - 17:48 | 15-03-2013 - 20:55 | |
CVE-2013-3231 | 4.7 |
The llc_ui_recvmsg function in net/llc/af_llc.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom syst
|
29-11-2017 - 02:29 | 22-04-2013 - 11:41 | |
CVE-2013-3224 | 4.9 |
The bt_sock_recvmsg function in net/bluetooth/af_bluetooth.c in the Linux kernel before 3.9-rc7 does not properly initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted re
|
29-11-2017 - 02:29 | 22-04-2013 - 11:41 | |
CVE-2013-3222 | 4.9 |
The vcc_recvmsg function in net/atm/common.c in the Linux kernel before 3.9-rc7 does not initialize a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system
|
29-11-2017 - 02:29 | 22-04-2013 - 11:41 | |
CVE-2013-3235 | 4.9 |
net/tipc/socket.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure and a certain length variable, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom syste
|
29-11-2017 - 02:29 | 22-04-2013 - 11:41 | |
CVE-2013-0914 | 3.6 |
The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted
|
07-02-2014 - 04:45 | 22-03-2013 - 11:59 |