Логотип exploitDog
bind:CVE-2015-3331
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2015-3331

Количество 20

Количество 20

ubuntu логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
EPSS: Низкий
redhat логотип

CVE-2015-3331

больше 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 7.1
EPSS: Низкий
nvd логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
EPSS: Низкий
debian логотип

CVE-2015-3331

около 10 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ...

CVSS2: 9.3
EPSS: Низкий
github логотип

GHSA-px59-358h-xw3q

около 3 лет назад

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

EPSS: Низкий
oracle-oval логотип

ELSA-2015-0987

около 10 лет назад

ELSA-2015-0987: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-3036

около 10 лет назад

ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-3035

около 10 лет назад

ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2015-1081

около 10 лет назад

ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1491-1

почти 10 лет назад

Live patch for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1487-1

почти 10 лет назад

Live patch for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1488-1

почти 10 лет назад

Live patch for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1489-1

почти 10 лет назад

Live patch for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1071-1

около 10 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1478-1

почти 10 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1376-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0736-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:1174-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2015:0581-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-RU-2015:0621-1

больше 10 лет назад

Security update for Linux kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
4%
Низкий
около 10 лет назад
redhat логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 7.1
4%
Низкий
больше 10 лет назад
nvd логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

CVSS2: 9.3
4%
Низкий
около 10 лет назад
debian логотип
CVE-2015-3331

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_g ...

CVSS2: 9.3
4%
Низкий
около 10 лет назад
github логотип
GHSA-px59-358h-xw3q

The __driver_rfc4106_decrypt function in arch/x86/crypto/aesni-intel_glue.c in the Linux kernel before 3.19.3 does not properly determine the memory locations used for encrypted data, which allows context-dependent attackers to cause a denial of service (buffer overflow and system crash) or possibly execute arbitrary code by triggering a crypto API call, as demonstrated by use of a libkcapi test program with an AF_ALG(aead) socket.

4%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2015-0987

ELSA-2015-0987: kernel security and bug fix update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-3036

ELSA-2015-3036: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-3035

ELSA-2015-3035: Unbreakable Enterprise kernel security and bugfix update (IMPORTANT)

около 10 лет назад
oracle-oval логотип
ELSA-2015-1081

ELSA-2015-1081: kernel security, bug fix, and enhancement update (IMPORTANT)

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1491-1

Live patch for the Linux Kernel

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1487-1

Live patch for the Linux Kernel

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1488-1

Live patch for the Linux Kernel

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1489-1

Live patch for the Linux Kernel

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1071-1

Security update for the Linux Kernel

около 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1478-1

Security update for the Linux Kernel

почти 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1376-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0736-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:1174-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-SU-2015:0581-1

Security update for Linux kernel

больше 10 лет назад
suse-cvrf логотип
SUSE-RU-2015:0621-1

Security update for Linux kernel

больше 10 лет назад

Уязвимостей на страницу