Vulnerability & Exploit Database

Displaying entries 1 - 10 of 21 in total

Results for: CVE-2014-9585 Back to search

RHSA-2015:1788: kernel-rt security, bug fix, and enhancement update Vulnerability

  • Severity: 8
  • Published: August 31, 2015

The kernel-rt packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Daniel Borkmann for reporting CVE-2015-4700,and Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issuewas discovered by Ji Jianwen of Red ...

RHSA-2015:1778: kernel security and bug fix update Vulnerability

  • Severity: 8
  • Published: August 31, 2015

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Daniel Borkmann for reporting CVE-2015-4700,and Canonical for reporting the CVE-2015-1333 issue. The CVE-2015-0275issue was discovered by Xiong Zhou of Red Hat, and the CVE-2015-3212 issuewas discovered by Ji Jianwen of Red Hat...

ELSA-2015-1778 Important: Oracle Linux kernel security and bug fix update Vulnerability

  • Severity: 8
  • Published: August 31, 2015

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.

RHSA-2015:1081: kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 9
  • Published: May 27, 2015

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.Red Hat would like to thank Carl Henrik Lunde for reporting CVE-2014-9420. The security impact of the CVE-2015-1805 issue was discovered by Red Hat.This update also fixes several bugs and adds various enhancements.Documentation for these changes is availa...

ELSA-2015-1272 Moderate: Oracle Linux kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 9
  • Published: May 27, 2015

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a...

ELSA-2015-1081 Important: Oracle Linux kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 9
  • Published: May 27, 2015

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a...

ELSA-2015-2152 Important: Oracle Linux kernel security, bug fix, and enhancement update Vulnerability

  • Severity: 10
  • Published: March 16, 2015

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.

USN-2514-1: Linux kernel (OMAP4) vulnerabilities Vulnerability

  • Severity: 7
  • Published: January 09, 2015

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.

USN-2513-1: Linux kernel vulnerabilities Vulnerability

  • Severity: 7
  • Published: January 09, 2015

Race condition in the key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 3.18.2 allows local users to cause a denial of service (memory corruption or panic) or possibly have unspecified other impact via keyctl commands that trigger access to a key structure member during garbage collection of a key.