Количество 36
Количество 36

CVE-2018-1087
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVE-2018-1087
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.

CVE-2018-1087
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
CVE-2018-1087
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-r ...
GHSA-j658-wqr4-q3w7
kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.
ELSA-2018-4096
ELSA-2018-4096: Unbreakable Enterprise kernel security update (IMPORTANT)

SUSE-SU-2018:1636-1
Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3)

SUSE-SU-2018:1523-1
Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2)

SUSE-SU-2018:1171-1
Security update for the Linux Kernel

SUSE-SU-2018:1648-1
Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)

SUSE-SU-2018:1645-1
Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3)

SUSE-SU-2018:1644-1
Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3)

SUSE-SU-2018:1643-1
Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3)

SUSE-SU-2018:1642-1
Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3)

SUSE-SU-2018:1641-1
Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3)

SUSE-SU-2018:1640-1
Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3)

SUSE-SU-2018:1639-1
Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3)

SUSE-SU-2018:1637-1
Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3)

SUSE-SU-2018:1548-1
Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2)

SUSE-SU-2018:1545-1
Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2)
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2018-1087 kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest. | CVSS3: 8 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-1087 kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest. | CVSS3: 8 | 0% Низкий | около 7 лет назад |
![]() | CVE-2018-1087 kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest. | CVSS3: 8 | 0% Низкий | около 7 лет назад |
CVE-2018-1087 kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-r ... | CVSS3: 8 | 0% Низкий | около 7 лет назад | |
GHSA-j658-wqr4-q3w7 kernel KVM before versions kernel 4.16, kernel 4.16-rc7, kernel 4.17-rc1, kernel 4.17-rc2 and kernel 4.17-rc3 is vulnerable to a flaw in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest. | CVSS3: 7.8 | 0% Низкий | около 3 лет назад | |
ELSA-2018-4096 ELSA-2018-4096: Unbreakable Enterprise kernel security update (IMPORTANT) | около 7 лет назад | |||
![]() | SUSE-SU-2018:1636-1 Security update for the Linux Kernel (Live Patch 10 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1523-1 Security update for the Linux Kernel (Live Patch 20 for SLE 12 SP2) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1171-1 Security update for the Linux Kernel | около 7 лет назад | ||
![]() | SUSE-SU-2018:1648-1 Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1645-1 Security update for the Linux Kernel (Live Patch 6 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1644-1 Security update for the Linux Kernel (Live Patch 8 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1643-1 Security update for the Linux Kernel (Live Patch 1 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1642-1 Security update for the Linux Kernel (Live Patch 2 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1641-1 Security update for the Linux Kernel (Live Patch 3 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1640-1 Security update for the Linux Kernel (Live Patch 7 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1639-1 Security update for the Linux Kernel (Live Patch 9 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1637-1 Security update for the Linux Kernel (Live Patch 5 for SLE 12 SP3) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1548-1 Security update for the Linux Kernel (Live Patch 14 for SLE 12 SP2) | около 7 лет назад | ||
![]() | SUSE-SU-2018:1545-1 Security update for the Linux Kernel (Live Patch 13 for SLE 12 SP2) | около 7 лет назад |
Уязвимостей на страницу