Количество 23
Количество 23
ELSA-2013-0168
ELSA-2013-0168: kernel security and bug fix update (MODERATE)
ELSA-2013-0168-1
ELSA-2013-0168-1: kernel security and bug fix update (MODERATE)

CVE-2012-5515
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVE-2012-5515
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVE-2012-5515
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
CVE-2012-5515
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ...
GHSA-h2f3-x3v9-p3c5
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVE-2012-1568
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVE-2012-1568
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.

CVE-2012-1568
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
CVE-2012-1568
The ExecShield feature in a certain Red Hat patch for the Linux kernel ...

CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.
CVE-2012-4444
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kern ...
GHSA-vp43-m2w7-p2vc
The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries.
GHSA-q7cx-6c9q-7hf5
The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments.

SUSE-SU-2015:0944-1
Security update for Xen
ELSA-2012-2048
ELSA-2012-2048: Unbreakable Enterprise kernel security update (MODERATE)

SUSE-SU-2015:0940-1
Security update for Xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2013-0168 ELSA-2013-0168: kernel security and bug fix update (MODERATE) | больше 12 лет назад | |||
ELSA-2013-0168-1 ELSA-2013-0168-1: kernel security and bug fix update (MODERATE) | больше 12 лет назад | |||
![]() | CVE-2012-5515 The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2012-5515 The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. | CVSS2: 5.5 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2012-5515 The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад |
CVE-2012-5515 The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ... | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад | |
GHSA-h2f3-x3v9-p3c5 The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. | 0% Низкий | около 3 лет назад | ||
![]() | CVE-2012-1568 The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. | CVSS2: 1.9 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2012-1568 The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. | CVSS2: 1.9 | 0% Низкий | больше 13 лет назад |
![]() | CVE-2012-1568 The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. | CVSS2: 1.9 | 0% Низкий | больше 12 лет назад |
CVE-2012-1568 The ExecShield feature in a certain Red Hat patch for the Linux kernel ... | CVSS2: 1.9 | 0% Низкий | больше 12 лет назад | |
![]() | CVE-2012-4444 The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. | CVSS2: 5 | 3% Низкий | больше 12 лет назад |
![]() | CVE-2012-4444 The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. | CVSS2: 2.6 | 3% Низкий | больше 15 лет назад |
![]() | CVE-2012-4444 The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. | CVSS2: 5 | 3% Низкий | больше 12 лет назад |
CVE-2012-4444 The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kern ... | CVSS2: 5 | 3% Низкий | больше 12 лет назад | |
GHSA-vp43-m2w7-p2vc The ExecShield feature in a certain Red Hat patch for the Linux kernel in Red Hat Enterprise Linux (RHEL) 5 and 6 and Fedora 15 and 16 does not properly handle use of many shared libraries by a 32-bit executable file, which makes it easier for context-dependent attackers to bypass the ASLR protection mechanism by leveraging a predictable base address for one of these libraries. | 0% Низкий | около 3 лет назад | ||
GHSA-q7cx-6c9q-7hf5 The ip6_frag_queue function in net/ipv6/reassembly.c in the Linux kernel before 2.6.36 allows remote attackers to bypass intended network restrictions via overlapping IPv6 fragments. | 3% Низкий | около 3 лет назад | ||
![]() | SUSE-SU-2015:0944-1 Security update for Xen | больше 12 лет назад | ||
ELSA-2012-2048 ELSA-2012-2048: Unbreakable Enterprise kernel security update (MODERATE) | больше 12 лет назад | |||
![]() | SUSE-SU-2015:0940-1 Security update for Xen | больше 12 лет назад |
Уязвимостей на страницу