Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
arch linux vulnerabilities and exploits
(subscribe to this query)
437
VMScore
CVE-2014-8481
The instruction decoder in arch/x86/kvm/emulate.c in the KVM subsystem in the Linux kernel prior to 3.18-rc2 does not properly handle invalid instructions, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via a crafted applicat...
Linux Linux Kernel
NA
CVE-2023-3640
A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entr...
Linux Linux Kernel -
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux 9.0
445
VMScore
CVE-2018-12904
In arch/x86/kvm/vmx.c in the Linux kernel prior to 4.17.2, when nested virtualization is used, local attackers could cause L1 KVM guests to VMEXIT, potentially allowing privilege escalations and denial of service attacks due to lack of checking of CPL.
Linux Linux Kernel
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 16.04
1 EDB exploit
187
VMScore
CVE-2021-30178
An issue exists in the Linux kernel up to and including 5.11.11. synic_get in arch/x86/kvm/hyperv.c has a NULL pointer dereference for certain accesses to the SynIC Hyper-V context, aka CID-919f4ebc5987.
Linux Linux Kernel
Fedoraproject Fedora 32
Fedoraproject Fedora 33
Fedoraproject Fedora 34
481
VMScore
CVE-2019-19602
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel prior to 5.4.2, when GCC 9 is used, allows context-dependent malicious users to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_ow...
Linux Linux Kernel
Canonical Ubuntu Linux 18.04
Canonical Ubuntu Linux 19.10
436
VMScore
CVE-2008-4410
The vmi_write_ldt_entry function in arch/x86/kernel/vmi_32.c in the Virtual Machine Interface (VMI) in the Linux kernel 2.6.26.5 invokes write_idt_entry where write_ldt_entry was intended, which allows local users to cause a denial of service (persistent application failure) via ...
Linux Linux Kernel 2.6.26.5
615
VMScore
CVE-2013-4254
The validate_event function in arch/arm/kernel/perf_event.c in the Linux kernel prior to 3.10.8 on the ARM platform allows local users to gain privileges or cause a denial of service (NULL pointer dereference and system crash) by adding a hardware event to an event group led by a...
Linux Linux Kernel 3.10.5
Linux Linux Kernel 3.10.2
Linux Linux Kernel 3.10.1
Linux Linux Kernel 3.10.4
Linux Linux Kernel 3.10.6
Linux Linux Kernel
Linux Linux Kernel 3.10.0
Linux Linux Kernel 3.10.3
437
VMScore
CVE-2008-1514
arch/s390/kernel/ptrace.c in Linux kernel 2.6.9, and other versions prior to 2.6.27-rc6, on s390 platforms allows local users to cause a denial of service (kernel panic) via the user-area-padding test from the ptrace testsuite in 31-bit mode, which triggers an invalid dereference...
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.6.20.9
Linux Linux Kernel 2.6.26
Linux Linux Kernel 2.6.18
Linux Linux Kernel 2.6.11
Linux Linux Kernel 2.6.23.4
Linux Linux Kernel 2.6.22.15
Linux Linux Kernel 2.6.16.16
Linux Linux Kernel 2.6.18.7
Linux Linux Kernel 2.6.17.12
Linux Linux Kernel 2.6.16.39
Linux Linux Kernel 2.6.21
Linux Linux Kernel 2.6.16.9
Linux Linux Kernel 2.6.17.9
Linux Linux Kernel 2.6.11.2
Linux Linux Kernel 2.6.15.3
Linux Linux Kernel 2.6.11.10
Linux Linux Kernel 2.6.24.7
Linux Linux Kernel 2.6.16.43
Linux Linux Kernel 2.6.16.6
Linux Linux Kernel 2.6.16.8
Linux Linux Kernel
615
VMScore
CVE-2021-29657
arch/x86/kvm/svm/nested.c in the Linux kernel prior to 5.11.12 has a use-after-free in which an AMD KVM guest can bypass access control on host OS MSRs when there are nested guests, aka CID-a58d9166a756. This occurs because of a TOCTOU race condition associated with a VMCB12 doub...
Linux Linux Kernel
436
VMScore
CVE-2021-43056
An issue exists in the Linux kernel for powerpc prior to 5.14.15. It allows a malicious KVM guest to crash the host, when the host is running on Power8, due to an arch/powerpc/kvm/book3s_hv_rmhandlers.S implementation bug in the handling of the SRR1 register values.
Linux Linux Kernel
Fedoraproject Fedora 33
Fedoraproject Fedora 34
Fedoraproject Fedora 35
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »