Vulnerability & Exploit Database

Displaying entries 1 - 10 of 36 in total

Results for: CVE-2014-9322 Back to search

ELSA-2015-1272 Moderate: Oracle Linux kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 9
  • Published: May 27, 2015

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a...

USN-2491-1: Linux kernel (EC2) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 17, 2014

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

USN-2464-1: Linux kernel (OMAP4) vulnerabilities Vulnerability

  • Severity: 7
  • Published: December 17, 2014

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

SUSE Linux Security Advisory: SUSE-SU-2014:1669-1 Vulnerability

  • Severity: 7
  • Published: December 17, 2014

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

SUSE: CVE-2014-9322: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: December 17, 2014

arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space.

RHSA-2015:0009: kernel security update Vulnerability

  • Severity: 7
  • Published: December 17, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.

RHSA-2014:2031: kernel security update Vulnerability

  • Severity: 7
  • Published: December 17, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.

RHSA-2014:2030: kernel security update Vulnerability

  • Severity: 7
  • Published: December 17, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.

RHSA-2014:2029: kernel security update Vulnerability

  • Severity: 7
  • Published: December 17, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.

RHSA-2014:2028: kernel security update Vulnerability

  • Severity: 7
  • Published: December 17, 2014

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Andy Lutomirski for reporting this issue.All kernel users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. The system must berebooted for this update to take effect.