Логотип exploitDog
bind:"CVE-2025-39823"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-39823"

Количество 15

Количество 15

ubuntu логотип

CVE-2025-39823

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

EPSS: Низкий
redhat логотип

CVE-2025-39823

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

CVSS3: 7
EPSS: Низкий
nvd логотип

CVE-2025-39823

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

EPSS: Низкий
msrc логотип

CVE-2025-39823

около 2 месяцев назад

KVM: x86: use array_index_nospec with indices that come from guest

CVSS3: 7.8
EPSS: Низкий
debian логотип

CVE-2025-39823

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: K ...

EPSS: Низкий
github логотип

GHSA-g6f5-85j8-c4fr

около 2 месяцев назад

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03626-1

25 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3725-1

20 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03601-1

27 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03633-1

25 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03628-1

25 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:3751-1

19 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03600-1

27 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03615-1

26 дней назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:03634-1

25 дней назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-39823

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

0%
Низкий
около 2 месяцев назад
redhat логотип
CVE-2025-39823

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

CVSS3: 7
0%
Низкий
около 2 месяцев назад
nvd логотип
CVE-2025-39823

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

0%
Низкий
около 2 месяцев назад
msrc логотип
CVE-2025-39823

KVM: x86: use array_index_nospec with indices that come from guest

CVSS3: 7.8
0%
Низкий
около 2 месяцев назад
debian логотип
CVE-2025-39823

In the Linux kernel, the following vulnerability has been resolved: K ...

0%
Низкий
около 2 месяцев назад
github логотип
GHSA-g6f5-85j8-c4fr

In the Linux kernel, the following vulnerability has been resolved: KVM: x86: use array_index_nospec with indices that come from guest min and dest_id are guest-controlled indices. Using array_index_nospec() after the bounds checks clamps these values to mitigate speculative execution side-channels.

0%
Низкий
около 2 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:03626-1

Security update for the Linux Kernel

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:3725-1

Security update for the Linux Kernel

20 дней назад
suse-cvrf логотип
SUSE-SU-2025:03601-1

Security update for the Linux Kernel

27 дней назад
suse-cvrf логотип
SUSE-SU-2025:03633-1

Security update for the Linux Kernel

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:03628-1

Security update for the Linux Kernel

25 дней назад
suse-cvrf логотип
SUSE-SU-2025:3751-1

Security update for the Linux Kernel

19 дней назад
suse-cvrf логотип
SUSE-SU-2025:03600-1

Security update for the Linux Kernel

27 дней назад
suse-cvrf логотип
SUSE-SU-2025:03615-1

Security update for the Linux Kernel

26 дней назад
suse-cvrf логотип
SUSE-SU-2025:03634-1

Security update for the Linux Kernel

25 дней назад

Уязвимостей на страницу