Количество 88
Количество 88
ELSA-2022-9591
ELSA-2022-9591: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9590
ELSA-2022-9590: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2024-12433
ELSA-2024-12433: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-9710
ELSA-2022-9710: Unbreakable Enterprise kernel-container security update (IMPORTANT)
ELSA-2022-9709
ELSA-2022-9709: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2022-7337
ELSA-2022-7337: kernel security and bug fix update (IMPORTANT)
RLSA-2022:7110
Important: kernel security, bug fix, and enhancement update
ELSA-2022-7110
ELSA-2022-7110: kernel security, bug fix, and enhancement update (IMPORTANT)
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-29901
Intel microprocessor generations 6 to 8 are affected by a new Spectre ...
GHSA-55c8-6r36-9g85
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
BDU:2022-04388
Уязвимость микропрограммного обеспечения процессоров Intel и AMD, позволяющая нарушителю раскрыть защищаемую информацию из памяти ядра или осуществить атаку на хост-систему из виртуальных машин
ELSA-2025-20019
ELSA-2025-20019: Unbreakable Enterprise kernel security update (IMPORTANT)
CVE-2022-23816
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
CVE-2022-23816
A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
CVE-2022-23816
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none.
CVE-2022-23816
AMD: CVE-2022-23816 AMD CPU Branch Type Confusion
ELSA-2022-8267
ELSA-2022-8267: kernel security, bug fix, and enhancement update (MODERATE)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2022-9591 ELSA-2022-9591: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9590 ELSA-2022-9590: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2024-12433 ELSA-2024-12433: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 1 года назад | |||
ELSA-2022-9710 ELSA-2022-9710: Unbreakable Enterprise kernel-container security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-9709 ELSA-2022-9709: Unbreakable Enterprise kernel security update (IMPORTANT) | больше 3 лет назад | |||
ELSA-2022-7337 ELSA-2022-7337: kernel security and bug fix update (IMPORTANT) | около 3 лет назад | |||
RLSA-2022:7110 Important: kernel security, bug fix, and enhancement update | около 3 лет назад | |||
ELSA-2022-7110 ELSA-2022-7110: kernel security, bug fix, and enhancement update (IMPORTANT) | около 3 лет назад | |||
CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions. | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
CVE-2022-29901 Intel microprocessor generations 6 to 8 are affected by a new Spectre ... | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
GHSA-55c8-6r36-9g85 Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions. | CVSS3: 6.5 | 0% Низкий | больше 3 лет назад | |
BDU:2022-04388 Уязвимость микропрограммного обеспечения процессоров Intel и AMD, позволяющая нарушителю раскрыть защищаемую информацию из памяти ядра или осуществить атаку на хост-систему из виртуальных машин | CVSS3: 5.6 | 0% Низкий | больше 3 лет назад | |
ELSA-2025-20019 ELSA-2025-20019: Unbreakable Enterprise kernel security update (IMPORTANT) | 10 месяцев назад | |||
CVE-2022-23816 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none. | почти 3 года назад | |||
CVE-2022-23816 A flaw was found in hw. Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions. | CVSS3: 5.6 | больше 3 лет назад | ||
CVE-2022-23816 Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate is unused by its CNA. Notes: none. | почти 3 года назад | |||
CVE-2022-23816 AMD: CVE-2022-23816 AMD CPU Branch Type Confusion | больше 3 лет назад | |||
ELSA-2022-8267 ELSA-2022-8267: kernel security, bug fix, and enhancement update (MODERATE) | почти 3 года назад |
Уязвимостей на страницу