Количество 31
Количество 31
ELSA-2015-3036
ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)
ELSA-2015-3035
ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

CVE-2015-2150
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVE-2015-2150
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVE-2015-2150
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
CVE-2015-2150
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not pro ...

CVE-2015-3331
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVE-2015-3331
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVE-2015-3331
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
CVE-2015-3331
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ...

SUSE-SU-2015:1478-1
Security update for the Linux Kernel
GHSA-w7jv-fgrf-v497
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
GHSA-px59-358h-xw3q
The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.
ELSA-2015-0987
ELSA-2015-0987: kernel security and bug fix update (IMPORTANT)

SUSE-SU-2015:0658-1
Security Update for Linux Kernel
ELSA-2015-3020
ELSA-2015-3020: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2015-3019
ELSA-2015-3019: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2015-1081
ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT)

SUSE-SU-2015:1376-1
Security update for Linux kernel

SUSE-SU-2015:0736-1
Security update for Linux kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2015-3036 ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT) | около 10 лет назад | |||
ELSA-2015-3035 ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT) | около 10 лет назад | |||
![]() | CVE-2015-2150 Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2015-2150 Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 5.2 | 0% Низкий | больше 10 лет назад |
![]() | CVE-2015-2150 Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад |
CVE-2015-2150 Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not pro ... | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад | |
![]() | CVE-2015-3331 The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket. | CVSS2: 9.3 | 4% Низкий | около 10 лет назад |
![]() | CVE-2015-3331 The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket. | CVSS2: 7.1 | 4% Низкий | больше 10 лет назад |
![]() | CVE-2015-3331 The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket. | CVSS2: 9.3 | 4% Низкий | около 10 лет назад |
CVE-2015-3331 The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ... | CVSS2: 9.3 | 4% Низкий | около 10 лет назад | |
![]() | SUSE-SU-2015:1478-1 Security update for the Linux Kernel | почти 10 лет назад | ||
GHSA-w7jv-fgrf-v497 Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response. | 0% Низкий | около 3 лет назад | ||
GHSA-px59-358h-xw3q The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket. | 4% Низкий | около 3 лет назад | ||
ELSA-2015-0987 ELSA-2015-0987: kernel security and bug fix update (IMPORTANT) | около 10 лет назад | |||
![]() | SUSE-SU-2015:0658-1 Security Update for Linux Kernel | около 10 лет назад | ||
ELSA-2015-3020 ELSA-2015-3020: Unbreakable Enterprise kernel security update (IMPORTANT) | около 10 лет назад | |||
ELSA-2015-3019 ELSA-2015-3019: Unbreakable Enterprise kernel security update (IMPORTANT) | около 10 лет назад | |||
ELSA-2015-1081 ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT) | около 10 лет назад | |||
![]() | SUSE-SU-2015:1376-1 Security update for Linux kernel | больше 10 лет назад | ||
![]() | SUSE-SU-2015:0736-1 Security update for Linux kernel | больше 10 лет назад |
Уязвимостей на страницу