![]() ![]() Processors, the Linux kernel's protections against speculative branch Johannes Wikner and Kaveh Razavi discovered that for some Intel x86-64 ![]() Processors, the branch predictor could by mis-trained for return Johannes Wikner and Kaveh Razavi discovered that for some AMD x86-64 A remote attacker could possibly use this toĬause a denial of service or bypass firewall filtering. Implementation in the Linux Kernel incorrectly handled certain message ( CVE-2022-26373)ĭavid Leadbeater discovered that the netfilter IRC protocol tracking ![]() A local attacker could potentially use this Indirect Branch Restricted Speculation (eIBRS) did not properly handle RET Pawan Kumar Gupta, Alyssa Milburn, Amit Peled, Shani Rehana, Nir ShildanĪnd Ariel Sabba discovered that some Intel processors with Enhanced A localĪttacker could use this to cause a denial of service (system crash) or Video for Linux 2 (V4L2) implementation in the Linux kernel. It was discovered that an out-of-bounds write vulnerability existed in the linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud systems. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |