Логотип exploitDog
bind:"CVE-2019-18660" OR bind:"CVE-2019-15030" OR bind:"CVE-2019-15031" OR bind:"CVE-2019-19527"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2019-18660" OR bind:"CVE-2019-15030" OR bind:"CVE-2019-15031" OR bind:"CVE-2019-19527"

Количество 59

Количество 59

oracle-oval логотип

ELSA-2020-1372

около 5 лет назад

ELSA-2020-1372: kernel security and bug fix update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2019-18660

больше 5 лет назад

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
EPSS: Низкий
redhat логотип

CVE-2019-18660

больше 5 лет назад

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
EPSS: Низкий
nvd логотип

CVE-2019-18660

больше 5 лет назад

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
EPSS: Низкий
debian логотип

CVE-2019-18660

больше 5 лет назад

The Linux kernel before 5.4.1 on powerpc allows Information Exposure b ...

CVSS3: 4.7
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:0093-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3200-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-vrqr-mqc4-gmrf

около 3 лет назад

The Linux kernel through 5.3.13 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
EPSS: Низкий
oracle-oval логотип

ELSA-2020-2933

почти 5 лет назад

ELSA-2020-2933: kernel security and bug fix update (MODERATE)

EPSS: Низкий
fstec логотип

BDU:2020-02944

больше 5 лет назад

Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации

CVSS3: 4.7
EPSS: Низкий
ubuntu логотип

CVE-2019-15030

почти 6 лет назад

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
EPSS: Низкий
redhat логотип

CVE-2019-15030

почти 6 лет назад

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
EPSS: Низкий
nvd логотип

CVE-2019-15030

почти 6 лет назад

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
EPSS: Низкий
debian логотип

CVE-2019-15030

почти 6 лет назад

In the Linux kernel through 5.2.14 on the powerpc platform, a local us ...

CVSS3: 4.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3379-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2020:14354-1

около 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3316-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий
github логотип

GHSA-hjqf-7xm5-j2g8

около 3 лет назад

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

EPSS: Низкий
fstec логотип

BDU:2020-01488

почти 6 лет назад

Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 4.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2019:3381-1

больше 5 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2020-1372

ELSA-2020-1372: kernel security and bug fix update (MODERATE)

около 5 лет назад
ubuntu логотип
CVE-2019-18660

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
redhat логотип
CVE-2019-18660

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
nvd логотип
CVE-2019-18660

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
debian логотип
CVE-2019-18660

The Linux kernel before 5.4.1 on powerpc allows Information Exposure b ...

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:0093-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3200-1

Security update for the Linux Kernel

больше 5 лет назад
github логотип
GHSA-vrqr-mqc4-gmrf

The Linux kernel through 5.3.13 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

CVSS3: 4.7
0%
Низкий
около 3 лет назад
oracle-oval логотип
ELSA-2020-2933

ELSA-2020-2933: kernel security and bug fix update (MODERATE)

почти 5 лет назад
fstec логотип
BDU:2020-02944

Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации

CVSS3: 4.7
0%
Низкий
больше 5 лет назад
ubuntu логотип
CVE-2019-15030

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
0%
Низкий
почти 6 лет назад
redhat логотип
CVE-2019-15030

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
0%
Низкий
почти 6 лет назад
nvd логотип
CVE-2019-15030

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

CVSS3: 4.4
0%
Низкий
почти 6 лет назад
debian логотип
CVE-2019-15030

In the Linux kernel through 5.2.14 on the powerpc platform, a local us ...

CVSS3: 4.4
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3379-1

Security update for the Linux Kernel

больше 5 лет назад
suse-cvrf логотип
SUSE-SU-2020:14354-1

Security update for the Linux Kernel

около 5 лет назад
suse-cvrf логотип
SUSE-SU-2019:3316-1

Security update for the Linux Kernel

больше 5 лет назад
github логотип
GHSA-hjqf-7xm5-j2g8

In the Linux kernel through 5.2.14 on the powerpc platform, a local user can read vector registers of other users' processes via a Facility Unavailable exception. To exploit the venerability, a local user starts a transaction (via the hardware transactional memory instruction tbegin) and then accesses vector registers. At some point, the vector registers will be corrupted with the values from a different local Linux process because of a missing arch/powerpc/kernel/process.c check.

0%
Низкий
около 3 лет назад
fstec логотип
BDU:2020-01488

Уязвимость компонента arch/powerpc/kernel/process.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации

CVSS3: 4.4
0%
Низкий
почти 6 лет назад
suse-cvrf логотип
SUSE-SU-2019:3381-1

Security update for the Linux Kernel

больше 5 лет назад

Уязвимостей на страницу