Количество 59
Количество 59
ELSA-2020-1372
ELSA-2020-1372: kernel security and bug fix update (MODERATE)

CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure b ...

SUSE-SU-2020:0093-1
Security update for the Linux Kernel

SUSE-SU-2019:3200-1
Security update for the Linux Kernel
GHSA-vrqr-mqc4-gmrf
The Linux kernel through 5.3.13 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
ELSA-2020-2933
ELSA-2020-2933: kernel security and bug fix update (MODERATE)

BDU:2020-02944
Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.
CVE-2019-15030
In the Linux kernel through 5.2.14 on the powerpc platform, a local us ...

SUSE-SU-2019:3379-1
Security update for the Linux Kernel

SUSE-SU-2020:14354-1
Security update for the Linux Kernel

SUSE-SU-2019:3316-1
Security update for the Linux Kernel
GHSA-hjqf-7xm5-j2g8
In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

BDU:2020-01488
Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

SUSE-SU-2019:3381-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
ELSA-2020-1372 ELSA-2020-1372: kernel security and bug fix update (MODERATE) | около 5 лет назад | |||
![]() | CVE-2019-18660 The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2019-18660 The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2019-18660 The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c. | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад |
CVE-2019-18660 The Linux kernel before 5.4.1 on powerpc allows Information Exposure b ... | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад | |
![]() | SUSE-SU-2020:0093-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2019:3200-1 Security update for the Linux Kernel | больше 5 лет назад | ||
GHSA-vrqr-mqc4-gmrf The Linux kernel through 5.3.13 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c. | CVSS3: 4.7 | 0% Низкий | около 3 лет назад | |
ELSA-2020-2933 ELSA-2020-2933: kernel security and bug fix update (MODERATE) | почти 5 лет назад | |||
![]() | BDU:2020-02944 Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации | CVSS3: 4.7 | 0% Низкий | больше 5 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
CVE-2019-15030 In the Linux kernel through 5.2.14 on the powerpc platform, a local us ... | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад | |
![]() | SUSE-SU-2019:3379-1 Security update for the Linux Kernel | больше 5 лет назад | ||
![]() | SUSE-SU-2020:14354-1 Security update for the Linux Kernel | около 5 лет назад | ||
![]() | SUSE-SU-2019:3316-1 Security update for the Linux Kernel | больше 5 лет назад | ||
GHSA-hjqf-7xm5-j2g8 In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check. | 0% Низкий | около 3 лет назад | ||
![]() | BDU:2020-01488 Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации | CVSS3: 4.4 | 0% Низкий | почти 6 лет назад |
![]() | SUSE-SU-2019:3381-1 Security update for the Linux Kernel | больше 5 лет назад |
Уязвимостей на страницу