[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-4444-1 linux -- linux

ID: oval:org.secpod.oval:def:55032Date: (C)2019-06-25   (M)2024-04-17
Class: PATCHFamily: unix




Multiple researchers have discovered vulnerabilities in the way the Intel processor designs have implemented speculative forwarding of data filled into temporary microarchitectural structures . This flaw could allow an attacker controlling an unprivileged process to read sensitive information, including from the kernel and all other processes running on the system or cross guest/host boundaries to read host memory. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. To fully resolve these vulnerabilities it is also necessary to install updated CPU microcode. An updated intel-microcode package will be provided via a separate DSA. The updated CPU microcode may also be available as part of a system firmware update. In addition, this update includes a fix for a regression causing deadlocks inside the loopback driver, which was introduced by the update to 4.9.168 in the last Stretch point release.

Platform:
Linux Mint 3
Product:
linux-image-4.9
Reference:
DSA-4444-1
CVE-2018-12126
CVE-2018-12127
CVE-2018-12130
CVE-2019-11091
CVE    4
CVE-2018-12127
CVE-2018-12126
CVE-2018-12130
CVE-2019-11091
...
CPE    2
cpe:/a:linux:linux_image:4.9
cpe:/o:linux_mint:linux_mint:3

© SecPod Technologies