[USN-3524-1] Linux kernel vulnerability

Severity Critical
Affected Packages 9
CVEs 1

Several security issues were fixed in the Linux kernel.

Jann Horn discovered that microprocessors utilizing speculative execution
and indirect branch prediction may allow unauthorized memory reads via
sidechannel attacks. This flaw is known as Meltdown. A local attacker could
use this to expose sensitive information, including kernel memory.

Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:deb/ubuntu/linux-image-extra-3.13.0-139-generic?distro=trusty ubuntu linux-image-extra-3.13.0-139-generic < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-powerpc64-smp?distro=trusty ubuntu linux-image-3.13.0-139-powerpc64-smp < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-powerpc64-emb?distro=trusty ubuntu linux-image-3.13.0-139-powerpc64-emb < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-powerpc-smp?distro=trusty ubuntu linux-image-3.13.0-139-powerpc-smp < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-powerpc-e500mc?distro=trusty ubuntu linux-image-3.13.0-139-powerpc-e500mc < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-powerpc-e500?distro=trusty ubuntu linux-image-3.13.0-139-powerpc-e500 < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-lowlatency?distro=trusty ubuntu linux-image-3.13.0-139-lowlatency < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-generic?distro=trusty ubuntu linux-image-3.13.0-139-generic < 3.13.0-139.188 trusty
Affected pkg:deb/ubuntu/linux-image-3.13.0-139-generic-lpae?distro=trusty ubuntu linux-image-3.13.0-139-generic-lpae < 3.13.0-139.188 trusty
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...