Oracle

Linux

228 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 09.01.2015 21:59:01
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The parse_rock_ridge_inode_internal function in fs/isofs/rock.c in the Linux kernel before 3.18.2 does not validate a length value in the Extensions Reference (ER) System Use Field, which allows local users to obtain sensitive information from kernel...

Exploit
  • EPSS 2.88%
  • Veröffentlicht 24.12.2014 18:59:00
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 12.12.2014 18:59:03
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The paravirt_ops_setup function in arch/x86/kernel/kvm.c in the Linux kernel through 3.18 uses an improper paravirt_enabled setting for KVM guest kernels, which makes it easier for guest OS users to bypass the ASLR protection mechanism via a crafted ...

  • EPSS 0.94%
  • Veröffentlicht 15.11.2014 21:59:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The mod_auth_mellon module before 0.8.1 allows remote attackers to obtain sensitive information or cause a denial of service (segmentation fault) via unspecified vectors related to a "session overflow" involving "sessions overlapping in memory."

Exploit
  • EPSS 0.06%
  • Veröffentlicht 10.11.2014 11:55:09
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.

  • EPSS 0.04%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.

Exploit
  • EPSS 9.12%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.

Exploit
  • EPSS 3.38%
  • Veröffentlicht 10.11.2014 11:55:06
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork ...

  • EPSS 4.81%
  • Veröffentlicht 10.10.2014 10:55:07
  • Zuletzt bearbeitet 06.05.2026 22:30:45

The cache_merge_headers_out function in modules/cache/cache_util.c in the mod_cache module in the Apache HTTP Server before 2.4.11 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty HTTP...

Warnung Exploit
  • EPSS 89.06%
  • Veröffentlicht 25.09.2014 01:55:04
  • Zuletzt bearbeitet 22.04.2026 14:32:42

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted enviro...