Логотип exploitDog
bind:"CVE-2015-2150" OR bind:"CVE-2015-3331"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2015-2150" OR bind:"CVE-2015-3331"

Количество 31

Количество 31

oracle-oval логотип

ELSA-2015-3036

около 10 лет назад

ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-3035

около 10 лет назад

ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
ubuntu логотип

CVE-2015-2150

больше 10 лет назад

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 4.9
EPSS: Низкий
redhat логотип

CVE-2015-2150

больше 10 лет назад

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 5.2
EPSS: Низкий
nvd логотип

CVE-2015-2150

больше 10 лет назад

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2015-2150

больше 10 лет назад

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not pro ...

CVSS2: 4.9
EPSS: Низкий
ubuntu логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
EPSS: Низкий
redhat логотип

CVE-2015-3331

больше 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 7.1
EPSS: Низкий
nvd логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
EPSS: Низкий
debian логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ...

CVSS2: 9.3
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1478-1

почти 10 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-w7jv-fgrf-v497

около 3 лет назад

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

EPSS: Низкий
github логотип

GHSA-px59-358h-xw3q

около 3 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

EPSS: Низкий
oracle-oval логотип

ELSA-2015-0987

около 10 лет назад

ELSA-2015-0987: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0658-1

около 10 лет назад

Security Update for Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2015-3020

около 10 лет назад

ELSA-2015-3020: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-3019

около 10 лет назад

ELSA-2015-3019: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1081

около 10 лет назад

ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1376-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0736-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2015-3036

ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-3035

ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

около 10 лет назад
ubuntu логотип
CVE-2015-2150

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 4.9
0%
Низкий
больше 10 лет назад
redhat логотип
CVE-2015-2150

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 5.2
0%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-2150

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

CVSS2: 4.9
0%
Низкий
больше 10 лет назад
debian логотип
CVE-2015-2150

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not pro ...

CVSS2: 4.9
0%
Низкий
больше 10 лет назад
ubuntu логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
4%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 7.1
4%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
4%
Низкий
около 10 лет назад
debian логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ...

CVSS2: 9.3
4%
Низкий
около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1478-1

Security update for the Linux Kernel

почти 10 лет назад
github логотип
GHSA-w7jv-fgrf-v497

Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.

0%
Низкий
около 3 лет назад
github логотип
GHSA-px59-358h-xw3q

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

4%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2015-0987

ELSA-2015-0987: kernel security and bug fix update (IMPORTANT)

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0658-1

Security Update for Linux Kernel

около 10 лет назад
oracle-oval логотип
ELSA-2015-3020

ELSA-2015-3020: Unbreakable Enterprise kernel security update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-3019

ELSA-2015-3019: Unbreakable Enterprise kernel security update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1081

ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT)

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1376-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0736-1

Security update for Linux kernel

больше 10 лет назад

Уязвимостей на страницу