Information Leak via speculative execution side channel attacksID: oval:org.secpod.oval:def:51533 | Date: (C)2019-06-25 (M)2024-05-22 |
Class: PATCH | Family: unix |
It was discovered that a new class of side channel attacks impact most processors, including processors from Intel, AMD, and ARM. The attack allows malicious userspace processes to read kernel memory and malicious code in guests to read hypervisor memory. To address the issue, updates to the Linux Mint kernel and processor microcode will be needed. These updates will be announced in future Linux Mint Security Notices once they are available.
Platform: |
Linux Mint 18.x |
Linux Mint 17.x |
Product: |
qemu |
amd64-microcode |
intel-microcode |
linux-image-gke-4.4 |
linux-image-generic |
linux-image-lowlatency-4.4 |
linux-image-generic-4.4 |
linux-image-aws-4.4 |
linux-image-4.11 |
linux-image-4.13 |
linux-image |
linux-image-lowlatency |
linux-image-4.4 |
linux-image-kvm-4.4 |