Max CVSS | 7.8 | Min CVSS | 1.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2014-4608 | 7.5 |
Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a cra
|
06-08-2024 - 12:15 | 03-07-2014 - 04:22 | |
CVE-2014-3690 | 4.9 |
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.17.2 on Intel processors does not ensure that the value in the CR4 control register remains the same after a VM entry, which allows host OS users to kill arbitrary processes or caus
|
13-02-2023 - 00:42 | 10-11-2014 - 11:55 | |
CVE-2014-3611 | 4.7 |
Race condition in the __kvm_migrate_pit_timer function in arch/x86/kvm/i8254.c in the KVM subsystem in the Linux kernel through 3.17.2 allows guest OS users to cause a denial of service (host OS crash) by leveraging incorrect PIT emulation.
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3688 | 5.0 |
The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to
|
13-02-2023 - 00:41 | 30-11-2014 - 01:59 | |
CVE-2014-3687 | 7.8 |
The sctp_assoc_lookup_asconf_ack function in net/sctp/associola.c in the SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (panic) via duplicate ASCONF chunks that trigger an incorrect uncork
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3645 | 2.1 |
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel before 3.12 does not have an exit handler for the INVEPT instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3673 | 7.8 |
The SCTP implementation in the Linux kernel through 3.17.2 allows remote attackers to cause a denial of service (system crash) via a malformed ASCONF chunk, related to net/sctp/sm_make_chunk.c and net/sctp/sm_statefuns.c.
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3610 | 4.9 |
The WRMSR processing functionality in the KVM subsystem in the Linux kernel through 3.17.2 does not properly handle the writing of a non-canonical address to a model-specific register, which allows guest OS users to cause a denial of service (host OS
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3647 | 1.9 |
arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel through 3.17.2 does not properly perform RIP changes, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-3646 | 4.7 |
arch/x86/kvm/vmx.c in the KVM subsystem in the Linux kernel through 3.17.2 does not have an exit handler for the INVVPID instruction, which allows guest OS users to cause a denial of service (guest OS crash) via a crafted application.
|
13-02-2023 - 00:41 | 10-11-2014 - 11:55 | |
CVE-2014-7975 | 4.9 |
The do_umount function in fs/namespace.c in the Linux kernel through 3.17 does not require the CAP_SYS_ADMIN capability for do_remount_sb calls that change the root filesystem to read-only, which allows local users to cause a denial of service (loss
|
14-08-2020 - 18:15 | 13-10-2014 - 10:55 | |
CVE-2014-7207 | 4.9 |
A certain Debian patch to the IPv6 implementation in the Linux kernel 3.2.x through 3.2.63 does not properly validate arguments in ipv6_select_ident function calls, which allows local users to cause a denial of service (NULL pointer dereference and s
|
24-12-2014 - 03:00 | 10-11-2014 - 11:55 |