Show filters
109 Total Results
Displaying 1-10 of 109
Sort by:
Attacker Value
Unknown
CVE-2014-8133
Disclosure Date: December 17, 2014 (last updated October 05, 2023)
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value.
0
Attacker Value
Unknown
CVE-2014-3645
Disclosure Date: November 10, 2014 (last updated October 05, 2023)
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
0
Attacker Value
Unknown
CVE-2012-6647
Disclosure Date: May 26, 2014 (last updated October 05, 2023)
The futex_wait_requeue_pi function in kernel/futex.c in the Linux kernel before 3.5.1 does not ensure that calls have two different futex addresses, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a crafted FUTEX_WAIT_REQUEUE_PI command.
0
Attacker Value
Unknown
CVE-2013-7348
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function.
0
Attacker Value
Unknown
CVE-2013-7281
Disclosure Date: January 08, 2014 (last updated October 05, 2023)
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown
CVE-2013-7264
Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown
CVE-2013-7268
Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown
CVE-2013-7270
Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown
CVE-2013-7266
Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0
Attacker Value
Unknown
CVE-2013-7271
Disclosure Date: January 06, 2014 (last updated October 05, 2023)
The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.
0