CVE-2014-8884
- EPSS 0.04%
- Veröffentlicht 30.11.2014 01:59:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privilege...
- EPSS 18.31%
- Veröffentlicht 30.11.2014 01:59:03
- Zuletzt bearbeitet 06.05.2026 22:30:45
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malf...
- EPSS 1.96%
- Veröffentlicht 30.11.2014 01:59:02
- Zuletzt bearbeitet 06.05.2026 22:30:45
The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to ...
CVE-2014-8559
- EPSS 0.06%
- Veröffentlicht 10.11.2014 11:55:09
- Zuletzt bearbeitet 06.05.2026 22:30:45
The d_walk function in fs/dcache.c in the Linux kernel through 3.17.2 does not properly maintain the semantics of rename_lock, which allows local users to cause a denial of service (deadlock and system hang) via a crafted application.
CVE-2014-7207
- EPSS 0.09%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 06.05.2026 22:30:45
A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and s...
CVE-2014-8369
- EPSS 0.08%
- Veröffentlicht 10.11.2014 11:55:08
- Zuletzt bearbeitet 06.05.2026 22:30:45
The kvm_iommu_map_pages function in virt/kvm/iommu.c in the Linux kernel through 3.17.2 miscalculates the number of pages during the handling of a mapping failure, which allows guest OS users to cause a denial of service (host OS page unpinning) or p...
CVE-2014-3690
- EPSS 0.04%
- Veröffentlicht 10.11.2014 11:55:07
- Zuletzt bearbeitet 06.05.2026 22:30:45
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or caus...
CVE-2014-3610
- EPSS 0.05%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS...
CVE-2014-3611
- EPSS 0.04%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
CVE-2014-3645
- EPSS 0.09%
- Veröffentlicht 10.11.2014 11:55:06
- Zuletzt bearbeitet 06.05.2026 22:30:45
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.