5.9 Medium
AI Score
Confidence
High
6.2 Medium
CVSS2
Access Vector
ADJACENT_NETWORK
Access Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:H/Au:N/C:C/I:N/A:C
0.002 Low
EPSS
Percentile
61.7%
Andrew Honig reported a flaw in the way KVM (Kernel-based Virtual Machine)
emulated the IOAPIC. A privileged guest user could exploit this flaw to
read host memory or cause a denial of service (crash the host).
(CVE-2013-1798)
An information leak was discovered in the Linux kernel’s rcvmsg path for
ATM (Asynchronous Transfer Mode). A local user could exploit this flaw to
examine potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3222)
An information leak was discovered in the Linux kernel’s recvmsg path for
ax25 address family. A local user could exploit this flaw to examine
potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3223)
An information leak was discovered in the Linux kernel’s recvmsg path for
the bluetooth address family. A local user could exploit this flaw to
examine potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3224)
An information leak was discovered in the Linux kernel’s bluetooth rfcomm
protocol support. A local user could exploit this flaw to examine
potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3225)
An information leak was discovered in the Linux kernel’s IRDA (infrared)
support subsystem. A local user could exploit this flaw to examine
potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3228)
An information leak was discovered in the Linux kernel’s s390 - z/VM
support. A local user could exploit this flaw to examine potentially
sensitive information from the kernel’s stack memory. (CVE-2013-3229)
An information leak was discovered in the Linux kernel’s llc (Logical Link
Layer 2) support. A local user could exploit this flaw to examine
potentially sensitive information from the kernel’s stack memory.
(CVE-2013-3231)
An information leak was discovered in the Linux kernel’s receive message
handling for the netrom address family. A local user could exploit this
flaw to obtain sensitive information from the kernel’s stack memory.
(CVE-2013-3232)
An information leak was discovered in the Linux kernel’s Rose X.25 protocol
layer. A local user could exploit this flaw to examine potentially
sensitive information from the kernel’s stack memory. (CVE-2013-3234)
An information leak was discovered in the Linux kernel’s TIPC (Transparent
Inter Process Communication) protocol implementation. A local user could
exploit this flaw to examine potentially sensitive information from the
kernel’s stack memory. (CVE-2013-3235)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 10.04 | noarch | linux-image-2.6.32-353-ec2 | < 2.6.32-353.66 | UNKNOWN |
Ubuntu | 10.04 | noarch | linux-headers-2.6.32-353-ec2 | < 2.6.32-353.66 | UNKNOWN |
ubuntu.com/security/CVE-2013-1798
ubuntu.com/security/CVE-2013-3222
ubuntu.com/security/CVE-2013-3223
ubuntu.com/security/CVE-2013-3224
ubuntu.com/security/CVE-2013-3225
ubuntu.com/security/CVE-2013-3228
ubuntu.com/security/CVE-2013-3229
ubuntu.com/security/CVE-2013-3231
ubuntu.com/security/CVE-2013-3232
ubuntu.com/security/CVE-2013-3234
ubuntu.com/security/CVE-2013-3235