4.7

CVE-2019-18660

The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
LinuxLinux Kernel Version < 5.4.1
CanonicalUbuntu Linux Version14.04 SwEditionesm
CanonicalUbuntu Linux Version16.04 SwEditionlts
CanonicalUbuntu Linux Version18.04 SwEditionlts
CanonicalUbuntu Linux Version19.04
CanonicalUbuntu Linux Version19.10
FedoraprojectFedora Version30
FedoraprojectFedora Version31
OpensuseLeap Version15.1
RedhatEnterprise Linux Version6.0
RedhatEnterprise Linux Version7.0
RedhatEnterprise Linux Version8.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.03% 0.084
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.7 1 3.6
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
nvd@nist.gov 1.9 3.4 2.9
AV:L/AC:M/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.

https://seclists.org/bugtraq/2020/Jan/10
Third Party Advisory
Mailing List
https://usn.ubuntu.com/4225-1/
Third Party Advisory
https://usn.ubuntu.com/4225-2/
Third Party Advisory
https://usn.ubuntu.com/4226-1/
Third Party Advisory
https://usn.ubuntu.com/4227-1/
Third Party Advisory
https://usn.ubuntu.com/4227-2/
Third Party Advisory
https://usn.ubuntu.com/4228-1/
Third Party Advisory
https://usn.ubuntu.com/4228-2/
Third Party Advisory
http://www.openwall.com/lists/oss-security/2019/11/27/1
Patch
Third Party Advisory
Mailing List
https://www.openwall.com/lists/oss-security/2019/11/27/1
Patch
Third Party Advisory
Mailing List