Логотип exploitDog
bind:CVE-2019-19338
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-19338

Количество 18

Количество 18

ubuntu логотип

CVE-2019-19338

около 5 лет назад

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
EPSS: Низкий
redhat логотип

CVE-2019-19338

больше 5 лет назад

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
EPSS: Низкий
nvd логотип

CVE-2019-19338

около 5 лет назад

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
EPSS: Низкий
msrc логотип

CVE-2019-19338

почти 5 лет назад

CVSS3: 5.5
EPSS: Низкий
debian логотип

CVE-2019-19338

около 5 лет назад

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream ...

CVSS3: 5.5
EPSS: Низкий
github логотип

GHSA-qv7j-3q84-2q98

около 3 лет назад

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0834

больше 5 лет назад

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2020-0339

больше 5 лет назад

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3389-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3379-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0511-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

openSUSE-SU-2020:0336-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0560-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0584-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3316-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3381-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0599-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0093-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
redhat логотип
CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

CVSS3: 5.5
0%
Низкий
около 5 лет назад
msrc логотип
CVSS3: 5.5
0%
Низкий
почти 5 лет назад
debian логотип
CVE-2019-19338

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream ...

CVSS3: 5.5
0%
Низкий
около 5 лет назад
github логотип
GHSA-qv7j-3q84-2q98

A flaw was found in the fix for CVE-2019-11135, in the Linux upstream kernel versions before 5.5 where, the way Intel CPUs handle speculative execution of instructions when a TSX Asynchronous Abort (TAA) error occurs. When a guest is running on a host CPU affected by the TAA flaw (TAA_NO=0), but is not affected by the MDS issue (MDS_NO=1), the guest was to clear the affected buffers by using a VERW instruction mechanism. But when the MDS_NO=1 bit was exported to the guests, the guests did not use the VERW mechanism to clear the affected buffers. This issue affects guests running on Cascade Lake CPUs and requires that host has 'TSX' enabled. Confidentiality of data is the highest threat associated with this vulnerability.

0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2020-0834

ELSA-2020-0834: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 5 лет назад
oracle-oval логотип
ELSA-2020-0339

ELSA-2020-0339: kernel security and bug fix update (IMPORTANT)

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3389-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3379-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0511-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
openSUSE-SU-2020:0336-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0560-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0584-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3316-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3381-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0599-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0093-1

Security update for the Linux Kernel

больше 5 лет назад

Уязвимостей на страницу