Количество 102
Количество 102

SUSE-SU-2019:1242-1
Security update for the Linux Kernel

SUSE-SU-2019:1241-1
Security update for the Linux Kernel

SUSE-SU-2019:1240-1
Security update for the Linux Kernel
ELSA-2019-1175
ELSA-2019-1175: virt:rhel security update (IMPORTANT)

SUSE-SU-2019:1245-1
Security update for the Linux Kernel

SUSE-SU-2019:14051-1
Security update for the Linux Kernel

openSUSE-SU-2019:1404-1
Security update for the Linux Kernel
ELSA-2019-4640
ELSA-2019-4640: qemu security update (IMPORTANT)

openSUSE-SU-2019:1407-1
Security update for the Linux Kernel

SUSE-RU-2019:2767-1
Recommended update for xen

SUSE-SU-2019:2769-1
Security update for xen

SUSE-SU-2019:2753-1
Security update for xen

SUSE-SU-2019:1287-1
Security update for the Linux Kernel

SUSE-SU-2019:1550-1
Security update for the Linux Kernel

SUSE-SU-2019:1289-1
Security update for the Linux Kernel

SUSE-SU-2020:1275-1
Security update for the Linux Kernel

SUSE-SU-2020:1255-1
Security update for the Linux Kernel

CVE-2018-12126
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVE-2018-12126
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVE-2018-12126
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | SUSE-SU-2019:1242-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1241-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1240-1 Security update for the Linux Kernel | около 6 лет назад | ||
ELSA-2019-1175 ELSA-2019-1175: virt:rhel security update (IMPORTANT) | почти 6 лет назад | |||
![]() | SUSE-SU-2019:1245-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:14051-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | openSUSE-SU-2019:1404-1 Security update for the Linux Kernel | около 6 лет назад | ||
ELSA-2019-4640 ELSA-2019-4640: qemu security update (IMPORTANT) | около 6 лет назад | |||
![]() | openSUSE-SU-2019:1407-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-RU-2019:2767-1 Recommended update for xen | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2769-1 Security update for xen | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2753-1 Security update for xen | больше 5 лет назад | ||
![]() | SUSE-SU-2019:1287-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1550-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2019:1289-1 Security update for the Linux Kernel | около 6 лет назад | ||
![]() | SUSE-SU-2020:1275-1 Security update for the Linux Kernel | около 5 лет назад | ||
![]() | SUSE-SU-2020:1255-1 Security update for the Linux Kernel | около 5 лет назад | ||
![]() | CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf | CVSS3: 5.6 | 0% Низкий | около 6 лет назад |
![]() | CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf | CVSS3: 6.5 | 0% Низкий | около 6 лет назад |
![]() | CVE-2018-12126 Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf | CVSS3: 5.6 | 0% Низкий | около 6 лет назад |
Уязвимостей на страницу