Linux

Linux Kernel

12162 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 10.11.2014 11:55:08
  • Last modified 12.04.2025 10:46:40

A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and s...

Exploit
  • EPSS 0.04%
  • Published 10.11.2014 11:55:08
  • Last modified 12.04.2025 10:46:40

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the perf subsystem, which allows local users to cause a denial of service (out-of-bounds read and OOPS) or bypass the ASLR...

Exploit
  • EPSS 0.08%
  • Published 10.11.2014 11:55:08
  • Last modified 12.04.2025 10:46:40

kernel/trace/trace_syscalls.c in the Linux kernel through 3.17.2 does not properly handle private syscall numbers during use of the ftrace subsystem, which allows local users to gain privileges or cause a denial of service (invalid pointer dereferenc...

Exploit
  • EPSS 0.08%
  • Published 10.11.2014 11:55:08
  • Last modified 12.04.2025 10:46:40

The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or p...

  • EPSS 0.01%
  • Published 10.11.2014 11:55:07
  • Last modified 12.04.2025 10:46:40

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or caus...

Exploit
  • EPSS 0.05%
  • Published 10.11.2014 11:55:06
  • Last modified 12.04.2025 10:46:40

The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS...

  • EPSS 0.04%
  • Published 10.11.2014 11:55:06
  • Last modified 12.04.2025 10:46:40

Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.

  • EPSS 0.09%
  • Published 10.11.2014 11:55:06
  • Last modified 12.04.2025 10:46:40

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.06%
  • Published 10.11.2014 11:55:06
  • Last modified 12.04.2025 10:46:40

arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

  • EPSS 0.03%
  • Published 10.11.2014 11:55:06
  • Last modified 12.04.2025 10:46:40

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.