CVE-2014-7207
- EPSS 0.09%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and s...
CVE-2014-7825
- EPSS 0.04%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR...
CVE-2014-7826
- EPSS 0.08%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereferenc...
CVE-2014-8369
- EPSS 0.08%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or p...
CVE-2014-3690
- EPSS 0.01%
- Veröffentlicht 10.11.2014 11:55:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or caus...
CVE-2014-3610
- EPSS 0.05%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS...
CVE-2014-3611
- EPSS 0.04%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
CVE-2014-3645
- EPSS 0.09%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
CVE-2014-3646
- EPSS 0.06%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
CVE-2014-3647
- EPSS 0.03%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.