{"id":"CVE-2013-1059","details":"net/ceph/auth_none.c in the Linux kernel through 3.10 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via an auth_reply message that triggers an attempted build_request operation.","modified":"2026-04-16T06:20:52.436018708Z","published":"2013-07-08T17:55:01Z","related":["SUSE-RU-2015:0621-1","SUSE-SU-2015:0481-1","SUSE-SU-2015:0581-1","SUSE-SU-2015:0736-1","SUSE-SU-2015:1174-1","SUSE-SU-2015:1376-1"],"references":[{"type":"ADVISORY","url":"http://hkpco.kr/advisory/CVE-2013-1059.txt"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00012.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2013/07/09/7"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1941-1"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-1942-1"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/attachment.cgi?id=767633&action=diff"},{"type":"ADVISORY","url":"https://bugzilla.redhat.com/show_bug.cgi?id=977356"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-07/msg00012.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00004.html"},{"type":"ARTICLE","url":"http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2013/07/09/7"},{"type":"REPORT","url":"https://bugzilla.redhat.com/attachment.cgi?id=767633&action=diff"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=977356"}],"schema_version":"1.7.5"}