# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2017-8106 |
476 |
|
DoS |
2017-04-24 |
2017-05-05 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
The handle_invept function in arch/x86/kvm/vmx.c in the Linux kernel 3.12 through 3.15 allows privileged KVM guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a single-context INVEPT instruction with a NULL EPT pointer. |
2 |
CVE-2014-9090 |
17 |
|
DoS |
2014-11-30 |
2015-06-04 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite. |
3 |
CVE-2014-8989 |
264 |
|
Bypass |
2014-11-30 |
2017-01-03 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c. |
4 |
CVE-2014-8884 |
119 |
|
DoS Overflow +Priv |
2014-11-30 |
2018-01-05 |
6.1 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Complete |
Stack-based buffer overflow in the ttusbdecfe_dvbs_diseqc_send_master_cmd function in drivers/media/usb/ttusb-dec/ttusbdecfe.c in the Linux kernel before 3.17.4 allows local users to cause a denial of service (system crash) or possibly gain privileges via a large message length in an ioctl call. |
5 |
CVE-2014-8133 |
264 |
|
Bypass |
2014-12-17 |
2016-12-24 |
2.1 |
None |
Local |
Low |
Not required |
None |
Partial |
None |
arch/x86/kernel/tls.c in the Thread Local Storage (TLS) implementation in the Linux kernel through 3.18.1 allows local users to bypass the espfix protection mechanism, and consequently makes it easier for local users to bypass the ASLR protection mechanism, via a crafted application that makes a set_thread_area system call and later reads a 16-bit value. |
6 |
CVE-2014-7842 |
362 |
|
DoS |
2014-11-30 |
2017-01-03 |
4.9 |
None |
Local |
Low |
Not required |
None |
None |
Complete |
Race condition in arch/x86/kvm/x86.c in the Linux kernel before 3.17.4 allows guest OS users to cause a denial of service (guest OS crash) via a crafted application that performs an MMIO transaction or a PIO transaction to trigger a guest userspace emulation error report, a similar issue to CVE-2010-5313. |
7 |
CVE-2014-7841 |
399 |
|
DoS |
2014-11-30 |
2017-01-03 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk. |
8 |
CVE-2014-3688 |
399 |
|
DoS |
2014-11-30 |
2016-08-23 |
5.0 |
None |
Remote |
Low |
Not required |
None |
None |
Partial |
The SCTP implementation in the Linux kernel before 3.17.4 allows remote attackers to cause a denial of service (memory consumption) by triggering a large number of chunks in an association's output queue, as demonstrated by ASCONF probes, related to net/sctp/inqueue.c and net/sctp/sm_statefuns.c. |
9 |
CVE-2014-1446 |
399 |
|
+Info |
2014-01-18 |
2017-08-29 |
1.9 |
None |
Local |
Medium |
Not required |
Partial |
None |
None |
The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call. |
10 |
CVE-2014-1438 |
264 |
|
DoS +Priv |
2014-01-18 |
2014-03-16 |
4.7 |
None |
Local |
Medium |
Not required |
None |
None |
Complete |
The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application. |
11 |
CVE-2014-0038 |
20 |
2
|
+Priv |
2014-02-06 |
2018-01-03 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter. |
12 |
CVE-2013-7348 |
399 |
|
DoS |
2014-04-01 |
2014-04-01 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
Double free vulnerability in the ioctx_alloc function in fs/aio.c in the Linux kernel before 3.12.4 allows local users to cause a denial of service (system crash) or possibly have unspecified other impact via vectors involving an error condition in the aio_setup_ring function. |
13 |
CVE-2013-7281 |
200 |
|
+Info |
2014-01-08 |
2017-08-29 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The dgram_recvmsg function in net/ieee802154/dgram.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
14 |
CVE-2013-7271 |
20 |
|
+Info |
2014-01-06 |
2017-08-29 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The x25_recvmsg function in net/x25/af_x25.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
15 |
CVE-2013-7270 |
20 |
|
+Info |
2014-01-06 |
2017-08-29 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The packet_recvmsg function in net/packet/af_packet.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
16 |
CVE-2013-7269 |
20 |
|
+Info |
2014-01-06 |
2017-08-29 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The nr_recvmsg function in net/netrom/af_netrom.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
17 |
CVE-2013-7268 |
20 |
|
+Info |
2014-01-06 |
2014-03-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The ipx_recvmsg function in net/ipx/af_ipx.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
18 |
CVE-2013-7267 |
20 |
|
+Info |
2014-01-06 |
2014-03-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The atalk_recvmsg function in net/appletalk/ddp.c in the Linux kernel before 3.12.4 updates a certain length value without ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
19 |
CVE-2013-7266 |
20 |
|
+Info |
2014-01-06 |
2014-03-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The mISDN_sock_recvmsg function in drivers/isdn/mISDN/socket.c in the Linux kernel before 3.12.4 does not ensure that a certain length value is consistent with the size of an associated data structure, which allows local users to obtain sensitive information from kernel memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
20 |
CVE-2013-7265 |
20 |
|
+Info |
2014-01-06 |
2017-12-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
21 |
CVE-2013-7264 |
20 |
|
+Info |
2014-01-06 |
2017-12-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The l2tp_ip_recvmsg function in net/l2tp/l2tp_ip.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call. |
22 |
CVE-2013-7263 |
20 |
|
+Info |
2014-01-06 |
2017-12-16 |
4.9 |
None |
Local |
Low |
Not required |
Complete |
None |
None |
The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c. |
23 |
CVE-2013-7026 |
362 |
|
DoS |
2013-12-09 |
2014-01-08 |
4.7 |
None |
Local |
Medium |
Not required |
None |
None |
Complete |
Multiple race conditions in ipc/shm.c in the Linux kernel before 3.12.2 allow local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via a crafted application that uses shmctl IPC_RMID operations in conjunction with other shm system calls. |
24 |
CVE-2013-6432 |
|
|
DoS |
2013-12-09 |
2014-03-06 |
4.6 |
None |
Local |
Low |
??? |
None |
None |
Complete |
The ping_recvmsg function in net/ipv4/ping.c in the Linux kernel before 3.12.4 does not properly interact with read system calls on ping sockets, which allows local users to cause a denial of service (NULL pointer dereference and system crash) by leveraging unspecified privileges to execute a crafted application. |
25 |
CVE-2013-6382 |
119 |
|
DoS Overflow Mem. Corr. |
2013-11-27 |
2016-12-31 |
4.0 |
None |
Local |
High |
Not required |
None |
None |
Complete |
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c. |
26 |
CVE-2013-6381 |
119 |
|
DoS Overflow |
2013-11-27 |
2016-12-31 |
6.9 |
None |
Local |
Medium |
Not required |
Complete |
Complete |
Complete |
Buffer overflow in the qeth_snmp_command function in drivers/s390/net/qeth_core_main.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service or possibly have unspecified other impact via an SNMP ioctl call with a length value that is incompatible with the command-buffer size. |
27 |
CVE-2013-6380 |
20 |
|
DoS |
2013-11-27 |
2014-03-16 |
4.7 |
None |
Local |
Medium |
Not required |
None |
None |
Complete |
The aac_send_raw_srb function in drivers/scsi/aacraid/commctrl.c in the Linux kernel through 3.12.1 does not properly validate a certain size value, which allows local users to cause a denial of service (invalid pointer dereference) or possibly have unspecified other impact via an FSACTL_SEND_RAW_SRB ioctl call that triggers a crafted SRB command. |
28 |
CVE-2013-6378 |
189 |
|
DoS |
2013-11-27 |
2014-07-17 |
4.4 |
None |
Local |
Medium |
??? |
None |
None |
Complete |
The lbs_debugfs_write function in drivers/net/wireless/libertas/debugfs.c in the Linux kernel through 3.12.1 allows local users to cause a denial of service (OOPS) by leveraging root privileges for a zero-length write operation. |
29 |
CVE-2013-6376 |
189 |
|
DoS |
2013-12-14 |
2014-03-16 |
5.2 |
None |
Local Network |
Medium |
??? |
None |
None |
Complete |
The recalculate_apic_map function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (host OS crash) via a crafted ICR write operation in x2apic mode. |
30 |
CVE-2013-6368 |
20 |
|
DoS +Priv |
2013-12-14 |
2019-04-22 |
6.2 |
None |
Local |
High |
Not required |
Complete |
Complete |
Complete |
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address. |
31 |
CVE-2013-6367 |
189 |
|
DoS |
2013-12-14 |
2018-01-09 |
5.7 |
None |
Local Network |
Medium |
Not required |
None |
None |
Complete |
The apic_get_tmcct function in arch/x86/kvm/lapic.c in the KVM subsystem in the Linux kernel through 3.12.5 allows guest OS users to cause a denial of service (divide-by-zero error and host OS crash) via crafted modifications of the TMICT value. |
32 |
CVE-2013-4587 |
20 |
|
+Priv |
2013-12-14 |
2014-03-16 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value. |
33 |
CVE-2013-2930 |
264 |
|
|
2013-12-09 |
2014-03-06 |
3.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
None |
The perf_trace_event_perm function in kernel/trace/trace_event_perf.c in the Linux kernel before 3.12.2 does not properly restrict access to the perf subsystem, which allows local users to enable function tracing via a crafted application. |
34 |
CVE-2013-2929 |
264 |
|
Bypass +Info |
2013-12-09 |
2018-04-28 |
3.3 |
None |
Local |
Medium |
Not required |
Partial |
Partial |
None |
The Linux kernel before 3.12.2 does not properly use the get_dumpable function, which allows local users to bypass intended ptrace restrictions or obtain sensitive information from IA64 scratch registers via a crafted application, related to kernel/ptrace.c and arch/ia64/include/asm/processor.h. |
35 |
CVE-2012-6638 |
399 |
|
DoS |
2014-02-15 |
2014-02-18 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
The tcp_rcv_state_process function in net/ipv4/tcp_input.c in the Linux kernel before 3.2.24 allows remote attackers to cause a denial of service (kernel resource consumption) via a flood of SYN+FIN TCP packets, a different vulnerability than CVE-2012-2663. |