Red Hat Enterprise Linux For Power Big Endian Extended Update Support (EUS) 7.1 ppc64

CPE Details

Red Hat Enterprise Linux For Power Big Endian Extended Update Support (EUS) 7.1 ppc64
7.1_ppc64
2016-08-26
16h23 +00:00
2021-05-24
12h57 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

enterprise_linux_for_power_big_endian_eus

Version

7.1_ppc64

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2015-4170 2016-05-02 08h00 +00:00 Race condition in the ldsem_cmpxchg function in drivers/tty/tty_ldsem.c in the Linux kernel before 3.13-rc4-next-20131218 allows local users to cause a denial of service (ldsem_down_read and ldsem_down_write deadlock) by establishing a new tty thread during shutdown of a previous tty thread.
4.7
Moyen
CVE-2015-3214 2015-08-31 08h00 +00:00 The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
6.9
CVE-2015-5165 2015-08-12 12h00 +00:00 The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.
9.3
CVE-2015-2590 2015-07-16 10h00 +00:00 Unspecified vulnerability in Oracle Java SE 6u95, 7u80, and 8u45, and Java SE Embedded 7u75 and 8u33 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries, a different vulnerability than CVE-2015-4732.
9.8
Critique