Количество 59
Количество 59

SUSE-SU-2020:1255-1
Security update for the Linux Kernel

SUSE-SU-2020:0599-1
Security update for the Linux Kernel

CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.

CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.

CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c.
CVE-2019-15031
In the Linux kernel through 5.2.14 on the powerpc platform, a local us ...

openSUSE-SU-2019:2173-1
Security update for the Linux Kernel

CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.

CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.

CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that ...

openSUSE-SU-2019:2181-1
Security update for the Linux Kernel

SUSE-SU-2019:2414-1
Security update for the Linux Kernel

SUSE-SU-2019:2424-1
Security update for the Linux Kernel

SUSE-SU-2019:2412-1
Security update for the Linux Kernel

SUSE-SU-2019:2651-1
Security update for the Linux Kernel

SUSE-SU-2019:2648-1
Security update for the Linux Kernel

SUSE-SU-2019:2756-1
Security update for the Linux Kernel

SUSE-SU-2019:2658-1
Security update for the Linux Kernel
ELSA-2020-1016
ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2020:1255-1 Security update for the Linux Kernel | около 5 лет назад | ||
![]() | SUSE-SU-2020:0599-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | CVE-2019-15031 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15031 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15031 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via an interrupt. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process, because MSR_TM_ACTIVE is misused in arch/powerpc/kernel/process.c. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
CVE-2019-15031 In the Linux kernel through 5.2.14 on the powerpc platform, a local us ... | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад | |
![]() | openSUSE-SU-2019:2173-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | CVE-2019-19527 In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e. | CVSS3: 6.8 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2019-19527 In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e. | CVSS3: 6.8 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-19527 In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e. | CVSS3: 6.8 | 0% Низкий | больше 5 лет назад |
CVE-2019-19527 In the Linux kernel before 5.2.10, there is a use-after-free bug that ... | CVSS3: 6.8 | 0% Низкий | больше 5 лет назад | |
![]() | openSUSE-SU-2019:2181-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2414-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2424-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2412-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2651-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2648-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2756-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2658-1 Security update for the Linux Kernel | больше 5 лет назад | ||
ELSA-2020-1016 ELSA-2020-1016: kernel security, bug fix, and enhancement update (MODERATE) | около 5 лет назад |
Уязвимостей на страницу