Linux

Linux Kernel

12162 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 30.11.2014 01:59:06
  • Last modified 12.04.2025 10:46:40

Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privilege...

  • EPSS 0.09%
  • Published 30.11.2014 01:59:05
  • Last modified 12.04.2025 10:46:40

The __clear_user function in arch/arm64/lib/clear_user.S in the Linux kernel before 3.17.4 on the ARM64 platform allows local users to cause a denial of service (system crash) by reading one byte beyond a /dev/zero page boundary.

  • EPSS 0.07%
  • Published 30.11.2014 01:59:04
  • Last modified 12.04.2025 10:46:40

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace e...

Exploit
  • EPSS 18.31%
  • Published 30.11.2014 01:59:03
  • Last modified 12.04.2025 10:46:40

The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malf...

Exploit
  • EPSS 2.24%
  • Published 30.11.2014 01:59:02
  • Last modified 12.04.2025 10:46:40

The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to ...

  • EPSS 0.07%
  • Published 30.11.2014 01:59:00
  • Last modified 12.04.2025 10:46:40

Race condition in arch/x86/kvm/x86.c in the Linux kernel before 2.6.38 allows L2 guest OS users to cause a denial of service (L1 guest OS crash) via a crafted instruction that triggers an L2 emulation failure report, a similar issue to CVE-2014-7842.

  • EPSS 1.48%
  • Published 10.11.2014 11:55:10
  • Last modified 12.04.2025 10:46:40

The ieee80211_fragment function in net/mac80211/tx.c in the Linux kernel before 3.13.5 does not properly maintain a certain tail pointer, which allows remote attackers to obtain sensitive cleartext information by reading packets.

Exploit
  • EPSS 0.07%
  • Published 10.11.2014 11:55:09
  • Last modified 12.04.2025 10:46:40

The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 lacks intended decoder-table flags for certain RIP-relative instructions, which allows guest OS users to cause a denial of service (NULL pointe...

Exploit
  • EPSS 0.07%
  • Published 10.11.2014 11:55:09
  • Last modified 12.04.2025 10:46:40

The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel before 3.18-rc2 does not properly handle invalid instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS c...

Exploit
  • EPSS 0.06%
  • Published 10.11.2014 11:55:09
  • Last modified 12.04.2025 10:46:40

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.