Количество 23
Количество 23
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the imple ...
GHSA-c87p-h49c-qjmw
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
BDU:2020-03247
Уязвимость компонента SSBD ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
SUSE-SU-2020:1713-1
Security update for the Linux Kernel
SUSE-SU-2020:1699-1
Security update for the Linux Kernel
SUSE-SU-2020:1693-1
Security update for the Linux Kernel
ELSA-2020-3010
ELSA-2020-3010: kernel security, bug fix, and enhancement update (IMPORTANT)
SUSE-SU-2020:2134-1
Security update for the Linux Kernel
SUSE-SU-2020:2106-1
Security update for the Linux Kernel
SUSE-SU-2020:2121-1
Security update for the Linux Kernel
SUSE-SU-2020:2103-1
Security update for the Linux Kernel
openSUSE-SU-2020:0935-1
Security update for the Linux Kernel
SUSE-SU-2020:2107-1
Security update for the Linux Kernel
openSUSE-SU-2020:1153-1
Security update for the Linux Kernel
SUSE-SU-2020:2027-1
Security update for the Linux Kernel
SUSE-SU-2020:2105-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
CVE-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
CVE-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
CVE-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
CVE-2020-10766 A logic bug flaw was found in Linux kernel before 5.8-rc1 in the imple ... | CVSS3: 5.5 | 0% Низкий | около 5 лет назад | |
GHSA-c87p-h49c-qjmw A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. | 0% Низкий | больше 3 лет назад | ||
BDU:2020-03247 Уязвимость компонента SSBD ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации | CVSS3: 5.5 | 0% Низкий | больше 5 лет назад | |
SUSE-SU-2020:1713-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1699-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:1693-1 Security update for the Linux Kernel | больше 5 лет назад | |||
ELSA-2020-3010 ELSA-2020-3010: kernel security, bug fix, and enhancement update (IMPORTANT) | больше 5 лет назад | |||
SUSE-SU-2020:2134-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2106-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2121-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2103-1 Security update for the Linux Kernel | больше 5 лет назад | |||
openSUSE-SU-2020:0935-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2107-1 Security update for the Linux Kernel | больше 5 лет назад | |||
openSUSE-SU-2020:1153-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2027-1 Security update for the Linux Kernel | больше 5 лет назад | |||
SUSE-SU-2020:2105-1 Security update for the Linux Kernel | больше 5 лет назад |
Уязвимостей на страницу