Логотип exploitDog
bind:"CVE-2025-40300" OR bind:"CVE-2024-36357" OR bind:"CVE-2024-36350"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2025-40300" OR bind:"CVE-2024-36357" OR bind:"CVE-2024-36350"

Количество 65

Количество 65

oracle-oval логотип

ELSA-2025-19930

около 1 месяца назад

ELSA-2025-19930: kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20405

6 месяцев назад

ELSA-2025-20405: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20404

6 месяцев назад

ELSA-2025-20404: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
ubuntu логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

EPSS: Низкий
redhat логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

CVSS3: 6.5
EPSS: Низкий
nvd логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz

EPSS: Низкий
msrc логотип

CVE-2025-40300

3 месяца назад

x86/vmscape: Add conditional IBPB mitigation

CVSS3: 6.5
EPSS: Низкий
debian логотип

CVE-2025-40300

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x ...

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02325-1

5 месяцев назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02319-1

5 месяцев назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02316-1

5 месяцев назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02315-1

5 месяцев назад

Security update for xen

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20406

6 месяцев назад

ELSA-2025-20406: Unbreakable Enterprise kernel security update (MODERATE)

EPSS: Низкий
redos логотип

ROS-20250929-09

3 месяца назад

Множественные уязвимости linux-firmware

CVSS3: 5.6
EPSS: Низкий
github логотип

GHSA-x8qw-46ww-c957

3 месяца назад

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti...

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20560

3 месяца назад

ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20559

3 месяца назад

ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-20558

3 месяца назад

ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-15665

4 месяца назад

Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02326-1

5 месяцев назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
oracle-oval логотип
ELSA-2025-19930

ELSA-2025-19930: kernel security update (MODERATE)

около 1 месяца назад
oracle-oval логотип
ELSA-2025-20405

ELSA-2025-20405: Unbreakable Enterprise kernel security update (MODERATE)

6 месяцев назад
oracle-oval логотип
ELSA-2025-20404

ELSA-2025-20404: Unbreakable Enterprise kernel security update (MODERATE)

6 месяцев назад
ubuntu логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

0%
Низкий
3 месяца назад
redhat логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...

CVSS3: 6.5
0%
Низкий
3 месяца назад
nvd логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz

0%
Низкий
3 месяца назад
msrc логотип
CVE-2025-40300

x86/vmscape: Add conditional IBPB mitigation

CVSS3: 6.5
0%
Низкий
3 месяца назад
debian логотип
CVE-2025-40300

In the Linux kernel, the following vulnerability has been resolved: x ...

0%
Низкий
3 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02325-1

Security update for xen

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02319-1

Security update for xen

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02316-1

Security update for xen

5 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02315-1

Security update for xen

5 месяцев назад
oracle-oval логотип
ELSA-2025-20406

ELSA-2025-20406: Unbreakable Enterprise kernel security update (MODERATE)

6 месяцев назад
redos логотип
ROS-20250929-09

Множественные уязвимости linux-firmware

CVSS3: 5.6
3 месяца назад
github логотип
GHSA-x8qw-46ww-c957

In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti...

0%
Низкий
3 месяца назад
oracle-oval логотип
ELSA-2025-20560

ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20559

ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
oracle-oval логотип
ELSA-2025-20558

ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT)

3 месяца назад
fstec логотип
BDU:2025-15665

Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным

CVSS3: 6.5
0%
Низкий
4 месяца назад
suse-cvrf логотип
SUSE-SU-2025:02326-1

Security update for xen

5 месяцев назад

Уязвимостей на страницу