[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:109734
The kernel meta package

oval:org.secpod.oval:def:1501307
Race condition in the IPC object implementation in the Linux kernel allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

oval:org.secpod.oval:def:109978
This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor

oval:org.secpod.oval:def:109737
This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor

oval:org.secpod.oval:def:1501293
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

oval:org.secpod.oval:def:1501272
The KVM subsystem in the Linux kernel allow guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

oval:org.secpod.oval:def:204233
The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC ...

oval:org.secpod.oval:def:1501270
The KVM subsystem in the Linux kernel allow guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

oval:org.secpod.oval:def:52622
linux-lts-vivid: Linux hardware enablement kernel from Vivid The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:1501298
Race condition in the IPC object implementation in the Linux kernel allows local users to gain privileges by triggering an ipc_addid call that leads to uid and gid comparisons against uninitialized data, related to msg.c, shm.c, and util.c.

oval:org.secpod.oval:def:501723
The kernel packages contain the Linux kernel, the core of any Linux operating system. * It was found that the x86 ISA is prone to a denial of service attack inside a virtualized environment in the form of an infinite loop in the microcode due to the way delivering of benign exceptions such as #AC ...

oval:org.secpod.oval:def:52624
linux-lts-utopic: Linux hardware enablement kernel from Utopic The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:602276
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service. CVE-2015-5307 Ben Serebrin from Google discovered a guest to host denial of service flaw affecting the KVM hypervisor. A malicious guest can trigger an infinite stream of "alignment check&quot ...

oval:org.secpod.oval:def:52627
linux: Linux kernel The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:1501279
The flaws were found in the way the Linux kernel's file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a container could use this flaw to escape the bind mount and, potentially, escalate their p ...

oval:org.secpod.oval:def:89045462
This update fixes the following security issues: - bsc#955399 - Fix xm migrate --log_progress. Due to logic error progress was not logged when requested. - bsc#956832 - CVE-2015-8345: xen: qemu: net: eepro100: infinite loop in processing command block list - bsc#956592 - xen: virtual PMU is unsuppor ...

oval:org.secpod.oval:def:52626
linux-lts-wily: Linux hardware enablement kernel from Wily The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:602299
Multiple security issues have been found in the Xen virtualisation solution, which may result in denial of service or information disclosure.

oval:org.secpod.oval:def:702841
linux: Linux kernel The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:602352
Multiple vulnerabilities have been discovered in VirtualBox, an x86 virtualisation solution. Upstream support for the 4.1 release series has ended and since no information is available which would allow backports of isolated security fixes, security support for virtualbox in wheezy/oldstable needed ...

oval:org.secpod.oval:def:702840
linux-lts-wily: Linux hardware enablement kernel from Wily The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:501728
The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel"s file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a conta ...

oval:org.secpod.oval:def:109752
This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor

oval:org.secpod.oval:def:109921
The kernel meta package

oval:org.secpod.oval:def:203791
The kernel packages contain the Linux kernel, the core of any Linux operating system. * A flaw was found in the way the Linux kernel"s file system implementation handled rename operations in which the source was inside and the destination was outside of a bind mount. A privileged user inside a conta ...

oval:org.secpod.oval:def:32669
The host is installed with Oracle VM VirtualBox 4.0.x before 4.0.36, 4.1.x before 4.1.44, 4.2.x before 4.2.36, 4.3.x before 4.3.34 or 5.0.x before 5.0.10 and is prone to denial of service vulnerability. A flaw is present in the application, which fails to handle vectors related to svm.c and vmx.c. S ...

oval:org.secpod.oval:def:702838
linux: Linux kernel The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:702837
linux: Linux kernel The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:702832
linux-lts-vivid: Linux hardware enablement kernel from Vivid The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:702831
linux-lts-trusty: Linux hardware enablement kernel from Trusty The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:1501267
The KVM subsystem in the Linux kernel allow guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

oval:org.secpod.oval:def:702835
linux: Linux kernel The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:1501303
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel allows local users to cause a denial of service (OOPS) via crafted keyctl commands.

oval:org.secpod.oval:def:702834
linux-lts-utopic: Linux hardware enablement kernel from Utopic The system could be made to crash under certain conditions.

oval:org.secpod.oval:def:109740
The kernel meta package

oval:org.secpod.oval:def:89045402
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes. Following security bugs were fixed: - CVE-2015-7509: Mounting ext4 filesystems in no-journal mode could hav lead to a system crash . - CVE-2015-7799: The slhc_init function in drivers/net/slip/slhc.c in the ...

oval:org.secpod.oval:def:1800383
x86: inconsistent cachability flags on guest mappings. Multiple mappings of the same physical page with different cachability setting can cause problems. While one category affects only guests themselves , the other category being Machine Check exceptions can be fatal to entire hosts.

CWE    1
CWE-399
*CVE
CVE-2015-5307

© SecPod Technologies