Show filters
117 Total Results
Displaying 1-10 of 117
Sort by:
Attacker Value
Unknown

CVE-2014-8133

Disclosure Date: December 17, 2014 (last updated October 05, 2023)
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
0
Attacker Value
Unknown

CVE-2014-7207

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging (1) tun or (2) macvtap device access.
0
Attacker Value
Unknown

CVE-2014-3645

Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
0
Attacker Value
Unknown

CVE-2012-6647

Disclosure Date: May 26, 2014 (last updated October 05, 2023)
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
0
Attacker Value
Unknown

CVE-2013-7348

Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.
0
Attacker Value
Unknown

CVE-2013-7281

Disclosure Date: January 08, 2014 (last updated October 05, 2023)
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown

CVE-2013-7264

Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown

CVE-2013-7268

Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown

CVE-2013-7270

Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown

CVE-2013-7266

Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0