Логотип exploitDog
bind:"BDU:2025-15665" OR bind:"CVE-2025-40300"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2025-15665" OR bind:"CVE-2025-40300"

Количество 23

Количество 23

fstec логотип

BDU:2025-15665

4 месяца назад

Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
EPSS: Низкий
ubuntu логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

EPSS: Низкий
redhat логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz

EPSS: Низкий
msrc логотип

CVE-2025-40300

3 месяца назад

x86/vmscape: Add conditional IBPB mitigation

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x ...

EPSS: Низкий
github логотип

GHSA-x8qw-46ww-c957

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti...

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20560

3 месяца назад

ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20559

3 месяца назад

ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20558

3 месяца назад

ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19931

около 1 месяца назад

ELSA-2025-19931: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-19930

около 1 месяца назад

ELSA-2025-19930: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21118

17 дней назад

ELSA-2025-21118: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-21112

24 дня назад

ELSA-2025-21112: kernel security update (MODERATE)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3725-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03601-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03614-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03633-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3751-1

около 2 месяцев назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03600-1

2 месяца назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2025-15665

Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
0%
Низкий
4 месяца назад
ubuntu логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

CVSS3: 6.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-40300

x86/vmscape: Add conditional IBPB mitigation

CVSS3: 6.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x ...

0%
Низкий
3 месяца назад
github логотип
GHSA-x8qw-46ww-c957

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti...

0%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-20560

ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20559

ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20558

ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-19931

ELSA-2025-19931: kernel security update (MODERATE)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-19930

ELSA-2025-19930: kernel security update (MODERATE)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-21118

ELSA-2025-21118: kernel security update (MODERATE)

17 дней назад
oracle-oval логотип
ELSA-2025-21112

ELSA-2025-21112: kernel security update (MODERATE)

24 дня назад
suse-cvrf логотип
SUSE-SU-2025:3725-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03601-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03614-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:03633-1

Security update for the Linux Kernel

2 месяца назад
suse-cvrf логотип
SUSE-SU-2025:3751-1

Security update for the Linux Kernel

около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03600-1

Security update for the Linux Kernel

2 месяца назад

Уязвимостей на страницу