[USN-4253-1] Linux kernel vulnerability
Severity
Medium
Affected Packages
11
CVEs
1
The Linux kernel could be made to expose sensitive information.
It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/linux-image-virtual?distro=eoan | < 5.3.0.29.33 |
pkg:deb/ubuntu/linux-image-snapdragon?distro=eoan | < 5.3.0.29.33 |
pkg:deb/ubuntu/linux-image-lowlatency?distro=eoan | < 5.3.0.29.33 |
pkg:deb/ubuntu/linux-image-generic?distro=eoan | < 5.3.0.29.33 |
pkg:deb/ubuntu/linux-image-generic-lpae?distro=eoan | < 5.3.0.29.33 |
pkg:deb/ubuntu/linux-image-aws?distro=eoan | < 5.3.0.1010.12 |
pkg:deb/ubuntu/linux-image-5.3.0-29-snapdragon?distro=eoan | < 5.3.0-29.31 |
pkg:deb/ubuntu/linux-image-5.3.0-29-lowlatency?distro=eoan | < 5.3.0-29.31 |
pkg:deb/ubuntu/linux-image-5.3.0-29-generic?distro=eoan | < 5.3.0-29.31 |
pkg:deb/ubuntu/linux-image-5.3.0-29-generic-lpae?distro=eoan | < 5.3.0-29.31 |
pkg:deb/ubuntu/linux-image-5.3.0-1010-aws?distro=eoan | < 5.3.0-1010.11 |
- ID
- USN-4253-1
- Severity
- medium
- Severity from
- CVE-2019-14615
- URL
- https://ubuntu.com/security/notices/USN-4253-1
- Published
-
2020-01-28T03:03:12
(4 years ago) - Modified
-
2020-01-28T03:03:12
(4 years ago) - Other Advisories
-
- ALSA-2021:4356
- ELSA-2020-5569
- FREEBSD:D2C2C815-3793-11EA-8BE3-54E1AD3D6335
- openSUSE-SU-2020:0336-1
- RHSA-2021:4140
- RHSA-2021:4356
- SSA:2020-086-01
- SUSE-SU-2020:0511-1
- SUSE-SU-2020:0558-1
- SUSE-SU-2020:0559-1
- SUSE-SU-2020:0560-1
- SUSE-SU-2020:0580-1
- SUSE-SU-2020:0584-1
- SUSE-SU-2020:0599-1
- SUSE-SU-2020:0605-1
- SUSE-SU-2020:0613-1
- SUSE-SU-2020:1255-1
- SUSE-SU-2020:1275-1
- SUSE-SU-2020:1663-1
- USN-4253-2
- USN-4254-1
- USN-4254-2
- USN-4255-1
- USN-4255-2
- USN-4284-1
- USN-4285-1
- USN-4286-1
- USN-4286-2
- USN-4287-1
- USN-4287-2
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/linux-image-virtual?distro=eoan | ubuntu | linux-image-virtual | < 5.3.0.29.33 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-snapdragon?distro=eoan | ubuntu | linux-image-snapdragon | < 5.3.0.29.33 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-lowlatency?distro=eoan | ubuntu | linux-image-lowlatency | < 5.3.0.29.33 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-generic?distro=eoan | ubuntu | linux-image-generic | < 5.3.0.29.33 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-generic-lpae?distro=eoan | ubuntu | linux-image-generic-lpae | < 5.3.0.29.33 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-aws?distro=eoan | ubuntu | linux-image-aws | < 5.3.0.1010.12 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-29-snapdragon?distro=eoan | ubuntu | linux-image-5.3.0-29-snapdragon | < 5.3.0-29.31 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-29-lowlatency?distro=eoan | ubuntu | linux-image-5.3.0-29-lowlatency | < 5.3.0-29.31 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-29-generic?distro=eoan | ubuntu | linux-image-5.3.0-29-generic | < 5.3.0-29.31 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-29-generic-lpae?distro=eoan | ubuntu | linux-image-5.3.0-29-generic-lpae | < 5.3.0-29.31 | eoan | ||
Affected | pkg:deb/ubuntu/linux-image-5.3.0-1010-aws?distro=eoan | ubuntu | linux-image-5.3.0-1010-aws | < 5.3.0-1010.11 | eoan |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |