Vulnerability & Exploit Database

Displaying entries 1 - 10 of 16 in total

Results for: CVE-2015-5157 Back to search

SUSE: CVE-2015-5157: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: August 31, 2015

arch/x86/entry/entry_64.S in the Linux kernel before 4.1.6 on the x86_64 platform mishandles IRET faults in processing NMIs that occurred during userspace execution, which might allow local users to gain privileges by triggering an NMI.

RHSA-2016:0212: kernel-rt security, bug fix, and enhancement update Vulnerability

  • Severity: 7
  • Published: August 31, 2015

The kernel-rt packages contain the Linux kernel, the core of any Linuxoperating system.The kernel-rt packages have been upgraded to version 3.10.0-327.10.1, whichprovides a number of bug fixes and enhancements, including:(BZ#1282591)This update also fixes the following bugs:All kernel-rt users are advised to upgrade to these updated pack...

RHSA-2016:0185: kernel security and bug fix update Vulnerability

  • Severity: 7
  • Published: August 31, 2015

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update also fixes the following bugs:All kernel users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. The system must berebooted for this update to take effect.

ELSA-2016-0185 Important: Oracle Linux kernel security and bug fix update Vulnerability

  • Severity: 7
  • Published: August 31, 2015

The join_session_keyring function in security/keys/process_keys.c in the Linux kernel before 4.4.1 mishandles object references in a certain error case, which allows local users to gain privileges or cause a denial of service (integer overflow and use-after-free) via crafted keyctl commands.

DSA-3313-1 linux -- security update Vulnerability

  • Severity: 8
  • Published: August 31, 2015

The (1) udp_recvmsg and (2) udpv6_recvmsg functions in the Linux kernel before 4.0.6 do not properly consider yielding a processor, which allows remote attackers to cause a denial of service (system hang) via incorrect checksums within a UDP packet flood.