Vulnerability & Exploit Database

Displaying entries 1 - 10 of 14 in total

Results for: CVE-2014-1438 Back to search

SUSE: CVE-2014-3683: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: October 15, 2014

Integer overflow in rsyslog before 7.6.7 and 8.x before 8.4.2 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash) via a large priority (PRI) value. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3634.

SUSE: CVE-2014-3634: SUSE Linux Security Advisory Vulnerability

  • Severity: 8
  • Published: October 15, 2014

rsyslog before 7.6.6 and 8.x before 8.4.1 and sysklogd 1.5 and earlier allows remote attackers to cause a denial of service (crash), possibly execute arbitrary code, or have other unspecified impact via a crafted priority (PRI) value that triggers an out-of-bounds array access.

USN-2234-1: Linux kernel (EC2) vulnerabilities Vulnerability

  • Severity: 7
  • Published: June 07, 2014

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.

USN-2233-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 7
  • Published: June 07, 2014

The futex_requeue function in kernel/futex.c in the Linux kernel through 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification.

SUSE: CVE-2014-1438: SUSE Linux Security Advisory Vulnerability

  • Severity: 5
  • Published: January 18, 2014

The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application.

USN-2141-1: Linux kernel (OMAP4) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 14, 2013

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.

USN-2139-1: Linux kernel (OMAP4) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 14, 2013

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.

USN-2138-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 14, 2013

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.

USN-2136-1: Linux kernel (Raring HWE) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 14, 2013

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.

USN-2135-1: Linux kernel (Quantal HWE) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 14, 2013

Array index error in the kvm_vm_ioctl_create_vcpu function in virt/kvm/kvm_main.c in the KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges via a large id value.