Vulnerabilities > Linux > Linux Kernel > 2.6.29.1

DATE CVE VULNERABILITY TITLE RISK
2014-06-23 CVE-2014-4171 Local Denial of Service vulnerability in Linux Kernel
mm/shmem.c in the Linux kernel through 3.15.1 does not properly implement the interaction between range notification and hole punching, which allows local users to cause a denial of service (i_mutex hold) by using the mmap system call to access a hole, as demonstrated by interfering with intended shmem activity by blocking completion of (1) an MADV_REMOVE madvise call or (2) an FALLOC_FL_PUNCH_HOLE fallocate call.
4.7
2014-06-23 CVE-2014-0203 Use After Free vulnerability in multiple products
The __do_follow_link function in fs/namei.c in the Linux kernel before 2.6.33 does not properly handle the last pathname component during use of certain filesystems, which allows local users to cause a denial of service (incorrect free operations and system crash) via an open system call.
local
low complexity
linux oracle CWE-416
5.5
2014-06-05 CVE-2014-3940 Race Condition vulnerability in multiple products
The Linux kernel through 3.14.5 does not properly consider the presence of hugetlb entries, which allows local users to cause a denial of service (memory corruption or system crash) by accessing certain memory locations, as demonstrated by triggering a race condition via numa_maps read operations during hugepage migration, related to fs/proc/task_mmu.c and mm/mempolicy.c.
local
high complexity
redhat linux CWE-362
4.0
2014-06-05 CVE-2014-3917 Information Exposure vulnerability in multiple products
kernel/auditsc.c in the Linux kernel through 3.14.5, when CONFIG_AUDITSYSCALL is enabled with certain syscall rules, allows local users to obtain potentially sensitive single-bit values from kernel memory or cause a denial of service (OOPS) via a large value of a syscall number.
3.3
2014-04-27 CVE-2014-0181 Permissions, Privileges, and Access Controls vulnerability in multiple products
The Netlink implementation in the Linux kernel through 3.14.1 does not provide a mechanism for authorizing socket operations based on the opener of a socket, which allows local users to bypass intended access restrictions and modify network configurations by using a Netlink socket for the (1) stdout or (2) stderr of a setuid program.
local
low complexity
linux opensuse redhat suse CWE-264
2.1
2014-04-01 CVE-2014-2678 Null Pointer Dereference vulnerability in multiple products
The rds_iw_laddr_check function in net/rds/iw.c in the Linux kernel through 3.14 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a bind system call for an RDS socket on a system that lacks RDS transports.
4.7
2014-03-11 CVE-2014-2309 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
The ip6_route_add function in net/ipv6/route.c in the Linux kernel through 3.13.6 does not properly count the addition of routes, which allows remote attackers to cause a denial of service (memory consumption) via a flood of ICMPv6 Router Advertisement packets.
low complexity
linux opensuse suse CWE-119
6.1
2014-03-11 CVE-2014-0102 Cryptographic Issues vulnerability in Linux Kernel
The keyring_detect_cycle_iterator function in security/keys/keyring.c in the Linux kernel through 3.13.6 does not properly determine whether keyrings are identical, which allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
5.2
2013-11-27 CVE-2013-6382 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Linux Kernel
Multiple buffer underflows in the XFS implementation in the Linux kernel through 3.12.1 allow local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging the CAP_SYS_ADMIN capability for a (1) XFS_IOC_ATTRLIST_BY_HANDLE or (2) XFS_IOC_ATTRLIST_BY_HANDLE_32 ioctl call with a crafted length value, related to the xfs_attrlist_by_handle function in fs/xfs/xfs_ioctl.c and the xfs_compat_attrlist_by_handle function in fs/xfs/xfs_ioctl32.c.
local
high complexity
linux CWE-119
4.0
2013-11-20 CVE-2013-4588 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in multiple products
Multiple stack-based buffer overflows in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 2.6.33, when CONFIG_IP_VS is used, allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability for (1) a getsockopt system call, related to the do_ip_vs_get_ctl function, or (2) a setsockopt system call, related to the do_ip_vs_set_ctl function.
local
high complexity
linux canonical CWE-119
7.0