Логотип exploitDog
bind:"CVE-2014-3145" OR bind:"CVE-2014-3144" OR bind:"CVE-2014-0196"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2014-3145" OR bind:"CVE-2014-3144" OR bind:"CVE-2014-0196"

Количество 37

Количество 37

suse-cvrf логотип

SUSE-SU-2015:0736-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
ubuntu логотип

CVE-2014-3144

около 11 лет назад

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 4.9
EPSS: Низкий
redhat логотип

CVE-2014-3144

около 11 лет назад

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 5.4
EPSS: Низкий
nvd логотип

CVE-2014-3144

около 11 лет назад

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2014-3144

около 11 лет назад

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension imple ...

CVSS2: 4.9
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1174-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0581-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2015:0621-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0481-1

больше 11 лет назад

Security update for Linux kernel

EPSS: Низкий
github логотип

GHSA-xwpg-vm43-3qwm

около 3 лет назад

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
EPSS: Средний
oracle-oval логотип

ELSA-2014-0678

почти 11 лет назад

ELSA-2014-0678: kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2014-00333

около 11 лет назад

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

CVSS2: 6.9
EPSS: Средний
fstec логотип

BDU:2014-00109

около 11 лет назад

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

CVSS2: 6.9
EPSS: Средний
suse-cvrf логотип

SUSE-SU-2015:0652-1

около 13 лет назад

Security update for Kernel

EPSS: Низкий
github логотип

GHSA-j677-36rf-54pg

около 3 лет назад

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

EPSS: Низкий
fstec логотип

BDU:2014-00062

около 11 лет назад

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании

CVSS2: 4.9
EPSS: Низкий
oracle-oval логотип

ELSA-2014-3034

около 11 лет назад

ELSA-2014-3034: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
suse-cvrf логотип
SUSE-SU-2015:0736-1

Security update for Linux kernel

больше 10 лет назад
ubuntu логотип
CVE-2014-3144

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 4.9
0%
Низкий
около 11 лет назад
redhat логотип
CVE-2014-3144

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 5.4
0%
Низкий
около 11 лет назад
nvd логотип
CVE-2014-3144

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

CVSS2: 4.9
0%
Низкий
около 11 лет назад
debian логотип
CVE-2014-3144

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension imple ...

CVSS2: 4.9
0%
Низкий
около 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:1174-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0581-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-RU-2015:0621-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0481-1

Security update for Linux kernel

больше 11 лет назад
github логотип
GHSA-xwpg-vm43-3qwm

The n_tty_write function in drivers/tty/n_tty.c in the Linux kernel through 3.14.3 does not properly manage tty driver access in the "LECHO & !OPOST" case, which allows local users to cause a denial of service (memory corruption and system crash) or gain privileges by triggering a race condition involving read and write operations with long strings.

CVSS3: 5.5
60%
Средний
около 3 лет назад
oracle-oval логотип
ELSA-2014-0678

ELSA-2014-0678: kernel security update (IMPORTANT)

почти 11 лет назад
fstec логотип
BDU:2014-00333

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

CVSS2: 6.9
60%
Средний
около 11 лет назад
fstec логотип
BDU:2014-00109

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании или повысить свои привилегии

CVSS2: 6.9
60%
Средний
около 11 лет назад
suse-cvrf логотип
SUSE-SU-2015:0652-1

Security update for Kernel

около 13 лет назад
github логотип
GHSA-j677-36rf-54pg

The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.

0%
Низкий
около 3 лет назад
fstec логотип
BDU:2014-00062

Уязвимость операционной системы Linux, позволяющая злоумышленнику вызвать отказ в обслуживании

CVSS2: 4.9
0%
Низкий
около 11 лет назад
oracle-oval логотип
ELSA-2014-3034

ELSA-2014-3034: Unbreakable Enterprise kernel security update (IMPORTANT)

около 11 лет назад

Уязвимостей на страницу