Linux kernel through 3.14.5 allows local users to obtain sensitive kernel memory or cause denial of service via certain syscall rules
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | CentOS 7 : kernel (CESA-2014:1281) | 23 Sep 201400:00 | – | nessus |
Tenable Nessus | Oracle Linux 5 : kernel (ELSA-2014-1143) | 5 Sep 201400:00 | – | nessus |
Tenable Nessus | Fedora 20 : kernel-3.14.5-200.fc20 (2014-7033) | 6 Jun 201400:00 | – | nessus |
Tenable Nessus | RHEL 5 : kernel (RHSA-2014:1143) | 4 Sep 201400:00 | – | nessus |
Tenable Nessus | Oracle Linux 5 : kernel (ELSA-2014-1143-1) | 5 Sep 201400:00 | – | nessus |
Tenable Nessus | CentOS 5 : kernel (CESA-2014:1143) | 5 Sep 201400:00 | – | nessus |
Tenable Nessus | Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2014-3072) | 11 Sep 201400:00 | – | nessus |
Tenable Nessus | Oracle Linux 5 : ELSA-2014-1143-1: / kernel (ELSA-2014-11431) | 7 Sep 202300:00 | – | nessus |
Tenable Nessus | RHEL 7 : kernel (RHSA-2014:1281) | 23 Sep 201400:00 | – | nessus |
Tenable Nessus | Scientific Linux Security Update : kernel on SL5.x i386/x86_64 (20140903) | 5 Sep 201400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
ubuntu | 10.04 | noarch | linux | 2.6.32-64.128 | UNKNOWN |
ubuntu | 12.04 | noarch | linux | 3.2.0-68.102 | UNKNOWN |
ubuntu | 13.10 | noarch | linux | 3.11.0-26.45 | UNKNOWN |
ubuntu | 14.04 | noarch | linux | 3.13.0-33.58 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-armadaxp | 3.2.0-1637.54 | UNKNOWN |
ubuntu | 10.04 | noarch | linux-ec2 | 2.6.32-368.84 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-quantal | 3.5.0-54.81~precise1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-raring | 3.8.0-44.66~precise1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-saucy | 3.11.0-26.45~precise1 | UNKNOWN |
ubuntu | 12.04 | noarch | linux-lts-trusty | 3.13.0-33.58~precise1 | UNKNOWN |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo