Количество 19
Количество 19
BDU:2025-01763
Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2024-46707
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception.
CVE-2024-46707
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception.
CVE-2024-46707
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception.
CVE-2024-46707
KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3
CVE-2024-46707
In the Linux kernel, the following vulnerability has been resolved: K ...
GHSA-v4vv-7v49-m3wg
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception.
SUSE-SU-2024:3591-1
Security update for the Linux Kernel
SUSE-SU-2024:3559-1
Security update for the Linux Kernel
SUSE-SU-2024:3566-1
Security update for the Linux Kernel
ROS-20250206-01
Множественные уязвимости kernel-lt
SUSE-SU-2024:3592-1
Security update for the Linux Kernel
SUSE-SU-2024:3569-1
Security update for the Linux Kernel
SUSE-SU-2024:3587-1
Security update for the Linux Kernel
SUSE-SU-2024:3553-1
Security update for the Linux Kernel
SUSE-SU-2024:3564-1
Security update for the Linux Kernel
SUSE-SU-2024:3561-1
Security update for the Linux Kernel
SUSE-SU-2024:3551-1
Security update for the Linux Kernel
ELSA-2024-12815
ELSA-2024-12815: Unbreakable Enterprise kernel security update (IMPORTANT)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
BDU:2025-01763 Уязвимость компонента KVM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46707 In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46707 In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46707 In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46707 KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
CVE-2024-46707 In the Linux kernel, the following vulnerability has been resolved: K ... | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
GHSA-v4vv-7v49-m3wg In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Make ICC_*SGI*_EL1 undef in the absence of a vGICv3 On a system with a GICv3, if a guest hasn't been configured with GICv3 and that the host is not capable of GICv2 emulation, a write to any of the ICC_*SGI*_EL1 registers is trapped to EL2. We therefore try to emulate the SGI access, only to hit a NULL pointer as no private interrupt is allocated (no GIC, remember?). The obvious fix is to give the guest what it deserves, in the shape of a UNDEF exception. | CVSS3: 5.5 | 0% Низкий | около 1 года назад | |
SUSE-SU-2024:3591-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3559-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3566-1 Security update for the Linux Kernel | около 1 года назад | |||
ROS-20250206-01 Множественные уязвимости kernel-lt | CVSS3: 7.8 | 9 месяцев назад | ||
SUSE-SU-2024:3592-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3569-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3587-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3553-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3564-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3561-1 Security update for the Linux Kernel | около 1 года назад | |||
SUSE-SU-2024:3551-1 Security update for the Linux Kernel | около 1 года назад | |||
ELSA-2024-12815 ELSA-2024-12815: Unbreakable Enterprise kernel security update (IMPORTANT) | около 1 года назад |
Уязвимостей на страницу