Количество 15
Количество 15
CVE-2015-8551
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
CVE-2015-8551
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
CVE-2015-8551
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
CVE-2015-8551
The PCI backend driver in Xen, when running on an x86 system and using ...
GHSA-xrr8-pr2x-q64f
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks."
SUSE-SU-2016:0168-1
Security update for the Linux Kernel
openSUSE-SU-2016:0280-1
Security update for the Linux Kernel
SUSE-SU-2016:1707-1
Security update for the Linux Kernel
SUSE-SU-2016:0585-1
Security update for the Linux Kernel
SUSE-SU-2016:2105-1
Security update for the Linux Kernel
SUSE-SU-2016:1102-1
Security update for the Linux Kernel
SUSE-SU-2016:0911-1
Security update for the Linux Kernel
SUSE-SU-2016:1937-1
Security update for the Linux Kernel
SUSE-SU-2016:1764-1
Security update for the Linux Kernel
SUSE-SU-2016:1203-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-8551 The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks." | CVSS3: 6 | 0% Низкий | почти 10 лет назад | |
CVE-2015-8551 The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks." | CVSS2: 5.2 | 0% Низкий | около 10 лет назад | |
CVE-2015-8551 The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks." | CVSS3: 6 | 0% Низкий | почти 10 лет назад | |
CVE-2015-8551 The PCI backend driver in Xen, when running on an x86 system and using ... | CVSS3: 6 | 0% Низкий | почти 10 лет назад | |
GHSA-xrr8-pr2x-q64f The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to hit BUG conditions and cause a denial of service (NULL pointer dereference and host OS crash) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and a crafted sequence of XEN_PCI_OP_* operations, aka "Linux pciback missing sanity checks." | CVSS3: 6 | 0% Низкий | больше 3 лет назад | |
SUSE-SU-2016:0168-1 Security update for the Linux Kernel | около 10 лет назад | |||
openSUSE-SU-2016:0280-1 Security update for the Linux Kernel | около 10 лет назад | |||
SUSE-SU-2016:1707-1 Security update for the Linux Kernel | больше 9 лет назад | |||
SUSE-SU-2016:0585-1 Security update for the Linux Kernel | почти 10 лет назад | |||
SUSE-SU-2016:2105-1 Security update for the Linux Kernel | больше 9 лет назад | |||
SUSE-SU-2016:1102-1 Security update for the Linux Kernel | почти 10 лет назад | |||
SUSE-SU-2016:0911-1 Security update for the Linux Kernel | почти 10 лет назад | |||
SUSE-SU-2016:1937-1 Security update for the Linux Kernel | больше 9 лет назад | |||
SUSE-SU-2016:1764-1 Security update for the Linux Kernel | больше 9 лет назад | |||
SUSE-SU-2016:1203-1 Security update for the Linux Kernel | почти 10 лет назад |
Уязвимостей на страницу