Max CVSS | 7.8 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-5157 | 7.2 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.
|
14-03-2024 - 19:58 | 31-08-2015 - 10:59 | |
CVE-2015-3290 | 7.2 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform improperly relies on espfix64 during nested NMI processing, which allows local users to gain privileges by triggering an NMI within a certain instruction window.
|
05-02-2024 - 20:15 | 31-08-2015 - 10:59 | |
CVE-2015-5364 | 7.8 |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet f
|
02-02-2023 - 19:17 | 31-08-2015 - 10:59 | |
CVE-2015-5366 | 5.0 |
The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 provide inappropriate -EAGAIN return values, which allows remote attackers to cause a denial of service (EPOLLET epoll application read outage) via an incorrect chec
|
05-01-2018 - 02:30 | 31-08-2015 - 10:59 | |
CVE-2015-4167 | 4.7 |
The udf_read_inode function in fs/udf/inode.c in the Linux kernel before 3.19.1 does not validate certain length values, which allows local users to cause a denial of service (incorrect data representation or integer overflow, and OOPS) via a crafted
|
22-12-2016 - 02:59 | 05-08-2015 - 18:59 | |
CVE-2015-3291 | 2.1 |
arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform does not properly determine when nested NMI processing is occurring, which allows local users to cause a denial of service (skipped NMI) by modifying the rsp register,
|
22-12-2016 - 02:59 | 31-08-2015 - 10:59 |