rpm package
suse/kernel-source&distro=SUSE Linux Enterprise Server 11 SP3
pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3
Vulnerabilities (22)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-1420 | — | < 3.0.101-0.47.67.2 | 3.0.101-0.47.67.2 | Mar 16, 2015 | Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu | ||
| CVE-2015-2150 | — | < 3.0.101-0.47.67.2 | 3.0.101-0.47.67.2 | Mar 12, 2015 | Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a |
- CVE-2015-1420Mar 16, 2015affected < 3.0.101-0.47.67.2fixed 3.0.101-0.47.67.2
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu
- CVE-2015-2150Mar 12, 2015affected < 3.0.101-0.47.67.2fixed 3.0.101-0.47.67.2
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a
Page 2 of 2