rpm package
suse/kernel-syms-rt&distro=SUSE Linux Enterprise Real Time 11 SP3
pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP3
Vulnerabilities (23)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2015-0777 | — | < 3.0.101.rt130-0.33.40.1 | 3.0.101.rt130-0.33.40.1 | Apr 5, 2015 | drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in ho | ||
| CVE-2015-1420 | — | < 3.0.101.rt130-0.33.40.1 | 3.0.101.rt130-0.33.40.1 | Mar 16, 2015 | Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu | ||
| CVE-2015-2150 | — | < 3.0.101.rt130-0.33.40.1 | 3.0.101.rt130-0.33.40.1 | Mar 12, 2015 | Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a |
- CVE-2015-0777Apr 5, 2015affected < 3.0.101.rt130-0.33.40.1fixed 3.0.101.rt130-0.33.40.1
drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in ho
- CVE-2015-1420Mar 16, 2015affected < 3.0.101.rt130-0.33.40.1fixed 3.0.101.rt130-0.33.40.1
Race condition in the handle_to_path function in fs/fhandle.c in the Linux kernel through 3.19.1 allows local users to bypass intended size restrictions and trigger read operations on additional memory locations by changing the handle_bytes value of a file handle during the execu
- CVE-2015-2150Mar 12, 2015affected < 3.0.101.rt130-0.33.40.1fixed 3.0.101.rt130-0.33.40.1
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a
Page 2 of 2