Max CVSS | 7.2 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2014-3153 | 7.2 |
The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe wai
|
02-07-2024 - 12:17 | 07-06-2014 - 14:55 | |
CVE-2014-4699 | 6.9 |
The Linux kernel before 3.15.4 on Intel processors does not properly restrict use of a non-canonical value for the saved RIP address in the case of a system call that does not use IRET, which allows local users to leverage a race condition and gain p
|
16-02-2024 - 20:27 | 09-07-2014 - 11:07 | |
CVE-2014-0181 | 2.1 |
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configura
|
16-04-2023 - 15:15 | 27-04-2014 - 00:55 | |
CVE-2014-3145 | 4.9 |
The BPF_S_ANC_NLATTR_NEST extension implementation in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 uses the reverse order in a certain subtraction, which allows local users to cause a denial of service (over-read
|
13-02-2023 - 00:39 | 11-05-2014 - 21:55 | |
CVE-2014-3144 | 4.9 |
The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows loc
|
13-02-2023 - 00:38 | 11-05-2014 - 21:55 | |
CVE-2014-0206 | 2.1 |
Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.
|
13-02-2023 - 00:37 | 25-06-2014 - 11:19 | |
CVE-2014-3917 | 3.3 |
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a lar
|
15-07-2021 - 19:16 | 05-06-2014 - 17:55 | |
CVE-2014-4027 | 2.3 |
The rd_build_device_space function in drivers/target/target_core_rd.c in the Linux kernel before 3.14 does not properly initialize a certain data structure, which allows local users to obtain sensitive information from ramdisk_mcp memory by leveragin
|
21-08-2020 - 18:24 | 23-06-2014 - 11:21 | |
CVE-2014-4667 | 5.0 |
The sctp_association_free function in net/sctp/associola.c in the Linux kernel before 3.15.2 does not properly manage a certain backlog value, which allows remote attackers to cause a denial of service (socket outage) via a crafted SCTP packet.
|
14-08-2020 - 18:02 | 03-07-2014 - 04:22 | |
CVE-2014-3940 | 4.0 |
The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering
|
22-04-2019 - 17:48 | 05-06-2014 - 17:55 |