Количество 209
Количество 209
ELSA-2018-4144
ELSA-2018-4144: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2018-1852
ELSA-2018-1852: kernel security update (MODERATE)

BDU:2019-00719
Уязвимость функции Lazy FPU context switching процессоров Intel, позволяющая нарушителю получить доступ к защищаемой информации

ADV180016
Microsoft Guidance for Lazy FP State Restore

SUSE-SU-2018:1816-1
Security update for the Linux Kernel

BDU:2019-02816
Уязвимость функции оптимизации производительности Lazy FPU context switching процессоров Intel Core, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
GHSA-652g-78m6-29wq
A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE.

BDU:2019-00722
Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

CVE-2018-3639
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
CVE-2018-3639
Systems with microprocessors utilizing speculative execution and specu ...

openSUSE-SU-2018:2116-1
Security update for xen

SUSE-SU-2018:1981-1
Security update for xen

openSUSE-SU-2018:2211-1
Security update for xen

SUSE-SU-2018:2081-2
Security update for xen

SUSE-SU-2018:2081-1
Security update for xen

SUSE-SU-2018:2069-1
Security update for xen

SUSE-SU-2018:2059-1
Security update for xen

SUSE-SU-2018:2056-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2018-4144 ELSA-2018-4144: Unbreakable Enterprise kernel security update (IMPORTANT) | около 7 лет назад | |||
ELSA-2018-1852 ELSA-2018-1852: kernel security update (MODERATE) | около 7 лет назад | |||
![]() | BDU:2019-00719 Уязвимость функции Lazy FPU context switching процессоров Intel, позволяющая нарушителю получить доступ к защищаемой информации | CVSS3: 5.6 | 1% Низкий | больше 9 лет назад |
![]() | ADV180016 Microsoft Guidance for Lazy FP State Restore | около 7 лет назад | ||
![]() | SUSE-SU-2018:1816-1 Security update for the Linux Kernel | почти 7 лет назад | ||
![]() | BDU:2019-02816 Уязвимость функции оптимизации производительности Lazy FPU context switching процессоров Intel Core, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 4.3 | около 7 лет назад | |
GHSA-652g-78m6-29wq A flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897 in Red Hat Enterprise Linux 6.10 GA kernel. No other versions are affected by this CVE. | CVSS3: 5.5 | 0% Низкий | около 3 лет назад | |
![]() | BDU:2019-00722 Уязвимость ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 5.5 | 0% Низкий | почти 7 лет назад |
![]() | CVE-2018-3639 Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. | CVSS3: 5.5 | 47% Средний | около 7 лет назад |
![]() | CVE-2018-3639 Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. | CVSS3: 5.6 | 47% Средний | около 7 лет назад |
![]() | CVE-2018-3639 Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4. | CVSS3: 5.5 | 47% Средний | около 7 лет назад |
CVE-2018-3639 Systems with microprocessors utilizing speculative execution and specu ... | CVSS3: 5.5 | 47% Средний | около 7 лет назад | |
![]() | openSUSE-SU-2018:2116-1 Security update for xen | почти 7 лет назад | ||
![]() | SUSE-SU-2018:1981-1 Security update for xen | почти 7 лет назад | ||
![]() | openSUSE-SU-2018:2211-1 Security update for xen | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2081-2 Security update for xen | больше 6 лет назад | ||
![]() | SUSE-SU-2018:2081-1 Security update for xen | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2069-1 Security update for xen | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2059-1 Security update for xen | почти 7 лет назад | ||
![]() | SUSE-SU-2018:2056-1 Security update for xen | почти 7 лет назад |
Уязвимостей на страницу