Количество 65
Количество 65
ELSA-2025-19930
ELSA-2025-19930: kernel security update (MODERATE)
ELSA-2025-20405
ELSA-2025-20405: Unbreakable Enterprise kernel security update (MODERATE)
ELSA-2025-20404
ELSA-2025-20404: Unbreakable Enterprise kernel security update (MODERATE)
CVE-2025-40300
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...
CVE-2025-40300
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ...
CVE-2025-40300
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz
CVE-2025-40300
x86/vmscape: Add conditional IBPB mitigation
CVE-2025-40300
In the Linux kernel, the following vulnerability has been resolved: x ...
SUSE-SU-2025:02325-1
Security update for xen
SUSE-SU-2025:02319-1
Security update for xen
SUSE-SU-2025:02316-1
Security update for xen
SUSE-SU-2025:02315-1
Security update for xen
ELSA-2025-20406
ELSA-2025-20406: Unbreakable Enterprise kernel security update (MODERATE)
ROS-20250929-09
Множественные уязвимости linux-firmware
GHSA-x8qw-46ww-c957
In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti...
ELSA-2025-20560
ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20559
ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT)
ELSA-2025-20558
ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT)
BDU:2025-15665
Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
SUSE-SU-2025:02326-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
ELSA-2025-19930 ELSA-2025-19930: kernel security update (MODERATE) | около 1 месяца назад | |||
ELSA-2025-20405 ELSA-2025-20405: Unbreakable Enterprise kernel security update (MODERATE) | 6 месяцев назад | |||
ELSA-2025-20404 ELSA-2025-20404: Unbreakable Enterprise kernel security update (MODERATE) | 6 месяцев назад | |||
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ... | 0% Низкий | 3 месяца назад | ||
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimize ... | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and optimiz | 0% Низкий | 3 месяца назад | ||
CVE-2025-40300 x86/vmscape: Add conditional IBPB mitigation | CVSS3: 6.5 | 0% Низкий | 3 месяца назад | |
CVE-2025-40300 In the Linux kernel, the following vulnerability has been resolved: x ... | 0% Низкий | 3 месяца назад | ||
SUSE-SU-2025:02325-1 Security update for xen | 5 месяцев назад | |||
SUSE-SU-2025:02319-1 Security update for xen | 5 месяцев назад | |||
SUSE-SU-2025:02316-1 Security update for xen | 5 месяцев назад | |||
SUSE-SU-2025:02315-1 Security update for xen | 5 месяцев назад | |||
ELSA-2025-20406 ELSA-2025-20406: Unbreakable Enterprise kernel security update (MODERATE) | 6 месяцев назад | |||
ROS-20250929-09 Множественные уязвимости linux-firmware | CVSS3: 5.6 | 3 месяца назад | ||
GHSA-x8qw-46ww-c957 In the Linux kernel, the following vulnerability has been resolved: x86/vmscape: Add conditional IBPB mitigation VMSCAPE is a vulnerability that exploits insufficient branch predictor isolation between a guest and a userspace hypervisor (like QEMU). Existing mitigations already protect kernel/KVM from a malicious guest. Userspace can additionally be protected by flushing the branch predictors after a VMexit. Since it is the userspace that consumes the poisoned branch predictors, conditionally issue an IBPB after a VMexit and before returning to userspace. Workloads that frequently switch between hypervisor and userspace will incur the most overhead from the new IBPB. This new IBPB is not integrated with the existing IBPB sites. For instance, a task can use the existing speculation control prctl() to get an IBPB at context switch time. With this implementation, the IBPB is doubled up: one at context switch and another before running userspace. The intent is to integrate and opti... | 0% Низкий | 3 месяца назад | ||
ELSA-2025-20560 ELSA-2025-20560: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-20559 ELSA-2025-20559: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
ELSA-2025-20558 ELSA-2025-20558: Unbreakable Enterprise kernel security update (IMPORTANT) | 3 месяца назад | |||
BDU:2025-15665 Уязвимость компонента arch/x86 ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным | CVSS3: 6.5 | 0% Низкий | 4 месяца назад | |
SUSE-SU-2025:02326-1 Security update for xen | 5 месяцев назад |
Уязвимостей на страницу