Max CVSS | 6.9 | Min CVSS | 2.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-2925 | 6.9 |
The prepend_path function in fs/dcache.c in the Linux kernel before 4.2.4 does not properly handle rename actions inside a bind mount, which allows local users to bypass an intended container protection mechanism by renaming a directory, related to a
|
17-07-2024 - 15:29 | 16-11-2015 - 11:59 | |
CVE-2015-7872 | 2.1 |
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
|
13-02-2023 - 00:55 | 16-11-2015 - 11:59 | |
CVE-2015-0272 | 5.0 |
GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
|
13-02-2023 - 00:46 | 17-11-2015 - 15:59 | |
CVE-2015-5156 | 6.1 |
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corrup
|
12-02-2023 - 23:15 | 19-10-2015 - 10:59 | |
CVE-2015-7990 | 5.9 |
Race condition in the rds_sendmsg function in net/rds/sendmsg.c in the Linux kernel before 4.3.3 allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by using a socket t
|
17-10-2018 - 01:29 | 28-12-2015 - 11:59 | |
CVE-2015-8215 | 5.0 |
net/ipv6/addrconf.c in the IPv6 stack in the Linux kernel before 4.0 does not validate attempted changes to the MTU value, which allows context-dependent attackers to cause a denial of service (packet loss) via a value that is (1) smaller than the mi
|
04-11-2017 - 01:29 | 16-11-2015 - 21:59 | |
CVE-2015-7799 | 4.9 |
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted P
|
24-03-2017 - 01:59 | 19-10-2015 - 10:59 |