Analysis and contextual insights are available on OpenCVE Cloud.
Default status is the baseline for the product, each version can override it (e.g. patched versions marked unaffected).
| Vendor | Product | Default status | Versions | ||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | n/a | affected |
|
Configuration 1 [-]
|
No data.
No data available yet.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-4376 | The mp_get_count function in drivers/staging/sb105x/sb_pci_mp.c in the Linux kernel before 3.12 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a TIOCGICOUNT ioctl call. |
Ubuntu USN |
USN-2069-1 | Linux kernel (Raring HWE) vulnerabilities |
Ubuntu USN |
USN-2070-1 | Linux kernel (Saucy HWE) vulnerabilities |
Ubuntu USN |
USN-2073-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-2075-1 | Linux kernel vulnerabilities |
No CVSS v4.0
No CVSS v3.1
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
The EPSS score is 0.00031.
Key SSVC decision points have not yet been added.
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:45:14.840Z
Reserved: 2013-06-12T00:00:00.000Z
Link: CVE-2013-4516
No data.
Status : Modified
Published: 2013-11-12T14:35:12.540
Modified: 2026-04-29T01:13:23.040
Link: CVE-2013-4516
No data.
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN