Andrew Morton

3 exploits Active since Mar 2013
CVE-2013-0914 WRITEUP WRITEUP
Linux kernel <3.8.4 - Privilege Escalation
The flush_signal_handlers function in kernel/signal.c in the Linux kernel before 3.8.4 preserves the value of the sa_restorer field across an exec operation, which makes it easier for local users to bypass the ASLR protection mechanism via a crafted application containing a sigaction system call.
CVE-2013-2141 WRITEUP WRITEUP
Linux Kernel < 3.8.8 - Resource Management Error
The do_tkill function in kernel/signal.c in the Linux kernel before 3.8.9 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel memory via a crafted application that makes a (1) tkill or (2) tgkill system call.
CVE-2013-4483 WRITEUP WRITEUP
Linux Kernel < 3.9.11 - Numeric Error
The ipc_rcu_putref function in ipc/util.c in the Linux kernel before 3.10 does not properly manage a reference count, which allows local users to cause a denial of service (memory consumption or system crash) via a crafted application.