Количество 18
Количество 18

BDU:2020-01488
Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local us ...
GHSA-hjqf-7xm5-j2g8
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
ELSA-2020-1372
ELSA-2020-1372: kernel security and bug fix update (MODERATE)

openSUSE-SU-2019:2173-1
Security update for the Linux Kernel

openSUSE-SU-2019:2181-1
Security update for the Linux Kernel

SUSE-SU-2019:2414-1
Security update for the Linux Kernel

SUSE-SU-2019:2424-1
Security update for the Linux Kernel

SUSE-SU-2019:2412-1
Security update for the Linux Kernel

SUSE-SU-2019:2651-1
Security update for the Linux Kernel

SUSE-SU-2019:2648-1
Security update for the Linux Kernel

SUSE-SU-2019:3200-1
Security update for the Linux Kernel

SUSE-SU-2019:2756-1
Security update for the Linux Kernel

SUSE-SU-2019:2658-1
Security update for the Linux Kernel

SUSE-SU-2020:0093-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | BDU:2020-01488 Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local us ... | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад | |
GHSA-hjqf-7xm5-j2g8 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | 0% Низкий | около 3 лет назад | ||
ELSA-2020-1372 ELSA-2020-1372: kernel security and bug fix update (MODERATE) | около 5 лет назад | |||
![]() | openSUSE-SU-2019:2173-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | openSUSE-SU-2019:2181-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2414-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2424-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2412-1 Security update for the Linux Kernel | почти 6 лет назад | ||
![]() | SUSE-SU-2019:2651-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2648-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3200-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2756-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:2658-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2020:0093-1 Security update for the Linux Kernel | больше 5 лет назад |
Уязвимостей на страницу