[USN-4187-1] Linux kernel vulnerability
Severity
High
Affected Packages
28
CVEs
1
The system could be made to expose sensitive information.
Stephan van Schaik, Alyssa Milburn, Sebastian Ă–sterlund, Pietro Frigo,
Kaveh Razavi, Herbert Bos, Cristiano Giuffrida, Giorgi Maisuradze, Moritz
Lipp, Michael Schwarz, Daniel Gruss, and Jo Van Bulck discovered that Intel
processors using Transactional Synchronization Extensions (TSX) could
expose memory contents previously stored in microarchitectural buffers to a
malicious process that is executing on the same CPU core. A local attacker
could use this to expose sensitive information.
- ID
- USN-4187-1
- Severity
- high
- URL
- https://ubuntu.com/security/notices/USN-4187-1
- Published
-
2019-11-13T01:44:56
(4 years ago) - Modified
-
2019-11-13T01:44:56
(4 years ago) - Other Advisories
-
- ALAS-2019-1318
- ALAS2-2019-1364
- ALPINE:CVE-2019-11135
- ALSA-2020:0279
- ASA-201911-14
- DSA-4564-1
- DSA-4565-1
- DSA-4602-1
- ELSA-2019-3832
- ELSA-2019-3834
- ELSA-2019-3836
- ELSA-2019-4836
- ELSA-2019-4837
- ELSA-2019-4838
- ELSA-2019-4839
- ELSA-2019-4850
- ELSA-2019-4854
- ELSA-2019-4855
- ELSA-2019-4867
- ELSA-2019-4868
- ELSA-2020-0279
- ELSA-2020-0366
- FEDORA-2019-021c968423
- FEDORA-2019-124a241044
- FEDORA-2019-1689d3fe07
- FEDORA-2019-2e12bd3a9a
- FEDORA-2019-34a75d7e61
- FEDORA-2019-376ec5c107
- FEDORA-2019-39e97683e8
- FEDORA-2019-3d7105bd2a
- FEDORA-2019-68d7f68507
- FEDORA-2019-6aad703290
- FEDORA-2019-7a3fc17778
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-b737d03b83
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-cbb732f760
- FEDORA-2020-203ffedeb5
- FEDORA-2020-227a4c0530
- FEDORA-2020-2a5cdd665c
- FEDORA-2020-2d9a75fadb
- FEDORA-2020-3cd64d683c
- FEDORA-2020-8490989850
- FEDORA-2020-c2d89d14d0
- FEDORA-2020-e328697628
- FEDORA-2020-f884f9dd7d
- FEDORA-2020-fe00e12580
- FREEBSD:FBE10A8A-05A1-11EA-9DFA-F8B156AC3FF9
- GLSA-202003-56
- MS:CVE-2019-11135
- openSUSE-SU-2019:2503-1
- openSUSE-SU-2019:2504-1
- openSUSE-SU-2019:2505-1
- openSUSE-SU-2019:2506-1
- openSUSE-SU-2019:2507-1
- openSUSE-SU-2019:2509-1
- openSUSE-SU-2019:2510-1
- openSUSE-SU-2019:2527-1
- openSUSE-SU-2019:2528-1
- openSUSE-SU-2019:2710-1
- RHSA-2019:3832
- RHSA-2019:3833
- RHSA-2019:3834
- RHSA-2019:3835
- RHSA-2019:3836
- RHSA-2019:3936
- RHSA-2020:0028
- RHSA-2020:0279
- RHSA-2020:0366
- RLSA-2020:0279
- SSA:2019-320-01
- SUSE-SU-2019:2946-1
- SUSE-SU-2019:2947-1
- SUSE-SU-2019:2948-1
- SUSE-SU-2019:2949-1
- SUSE-SU-2019:2950-1
- SUSE-SU-2019:2951-1
- SUSE-SU-2019:2952-1
- SUSE-SU-2019:2953-1
- SUSE-SU-2019:2954-1
- SUSE-SU-2019:2955-1
- SUSE-SU-2019:2956-1
- SUSE-SU-2019:2957-1
- SUSE-SU-2019:2958-1
- SUSE-SU-2019:2959-1
- SUSE-SU-2019:2960-1
- SUSE-SU-2019:2961-1
- SUSE-SU-2019:2962-1
- SUSE-SU-2019:2984-1
- SUSE-SU-2019:2986-1
- SUSE-SU-2019:2987-1
- SUSE-SU-2019:2988-1
- SUSE-SU-2019:3091-1
- SUSE-SU-2019:3200-1
- SUSE-SU-2019:3294-1
- SUSE-SU-2019:3295-1
- SUSE-SU-2019:3297-1
- SUSE-SU-2019:3340-1
- SUSE-SU-2019:3348-1
- SUSE-SU-2020:0093-1
- SUSE-SU-2020:0334-1
- SUSE-SU-2020:0388-1
- USN-4182-1
- USN-4182-2
- USN-4183-1
- USN-4184-1
- USN-4185-1
- USN-4185-2
- USN-4186-1
- USN-4186-2
- USN-4188-1
- VMSA-2019-0020
- XSA-305
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=trusty | ubuntu | linux-image-virtual | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-server?distro=trusty | ubuntu | linux-image-server | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-smp?distro=trusty | ubuntu | linux-image-powerpc64-smp | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc64-emb?distro=trusty | ubuntu | linux-image-powerpc64-emb | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-smp?distro=trusty | ubuntu | linux-image-powerpc-smp | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500mc?distro=trusty | ubuntu | linux-image-powerpc-e500mc | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-powerpc-e500?distro=trusty | ubuntu | linux-image-powerpc-e500 | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-omap?distro=trusty | ubuntu | linux-image-omap | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=trusty | ubuntu | linux-image-lowlatency | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency-pae?distro=trusty | ubuntu | linux-image-lowlatency-pae | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-highbank?distro=trusty | ubuntu | linux-image-highbank | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=trusty | ubuntu | linux-image-generic | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-pae?distro=trusty | ubuntu | linux-image-generic-pae | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lts-trusty | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lts-saucy | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-raring?distro=trusty | ubuntu | linux-image-generic-lts-raring | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lts-quantal?distro=trusty | ubuntu | linux-image-generic-lts-quantal | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=trusty | ubuntu | linux-image-generic-lpae | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-trusty?distro=trusty | ubuntu | linux-image-generic-lpae-lts-trusty | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae-lts-saucy?distro=trusty | ubuntu | linux-image-generic-lpae-lts-saucy | < 3.13.0.175.186 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-powerpc64-smp?distro=trusty | ubuntu | linux-image-3.13.0-175-powerpc64-smp | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-powerpc64-emb?distro=trusty | ubuntu | linux-image-3.13.0-175-powerpc64-emb | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-powerpc-smp?distro=trusty | ubuntu | linux-image-3.13.0-175-powerpc-smp | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-powerpc-e500mc?distro=trusty | ubuntu | linux-image-3.13.0-175-powerpc-e500mc | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-powerpc-e500?distro=trusty | ubuntu | linux-image-3.13.0-175-powerpc-e500 | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-lowlatency?distro=trusty | ubuntu | linux-image-3.13.0-175-lowlatency | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-generic?distro=trusty | ubuntu | linux-image-3.13.0-175-generic | < 3.13.0-175.226 | trusty | ||
Affected | pkg:deb/ubuntu/linux-image-3.13.0-175-generic-lpae?distro=trusty | ubuntu | linux-image-3.13.0-175-generic-lpae | < 3.13.0-175.226 | trusty |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |