Information Leak via speculative execution side channel attacksID: oval:org.secpod.oval:def:43415 | Date: (C)2018-01-05 (M)2024-02-19 |
Class: PATCH | Family: unix |
It was discovered that a new class of side channel attacks impact most processors, including processors from Intel, AMD, and ARM. The attack allows malicious userspace processes to read kernel memory and malicious code in guests to read hypervisor memory. To address the issue, updates to the Ubuntu kernel and processor microcode will be needed. These updates will be announced in future Ubuntu Security Notices once they are available.
Platform: |
Ubuntu 16.04 |
Ubuntu 14.04 |
Ubuntu 17.04 |
Ubuntu 17.10 |
Product: |
qemu |
amd64-microcode |
intel-microcode |
linux-image-gke-4.4 |
linux-image-generic |
linux-image-lowlatency-4.4 |
linux-image-generic-4.4 |
linux-image-aws-4.4 |
linux-image-generic-4.10 |
linux-image-lowlatency-4.10 |
linux-image-4.11 |
linux-image-generic-4.13 |
linux-image-4.13 |
linux-image-lowlatency-4.13 |
linux-image |
linux-image-lowlatency |
linux-image-4.4 |
linux-image-kvm-4.4 |