Lucene search

K
debianDebianDEBIAN:DLA-1787-1:EA5F1
HistoryMay 15, 2019 - 9:20 p.m.

[SECURITY] [DLA 1787-1] linux-4.9 security update

2019-05-1521:20:31
lists.debian.org
96

7.3 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

40.4%

Package : linux-4.9
Version : 4.9.168-1+deb9u2~deb8u1
CVE ID : CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
Debian Bug : 928125

Multiple researchers have discovered vulnerabilities in the way the
Intel processor designs have implemented speculative forwarding of data
filled into temporary microarchitectural structures (buffers). This
flaw could allow an attacker controlling an unprivileged process to
read sensitive information, including from the kernel and all other
processes running on the system or cross guest/host boundaries to read
host memory.

See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html
for more details.

To fully resolve these vulnerabilities it is also necessary to install
updated CPU microcode. An updated intel-microcode package (only
available in Debian non-free) will be provided via a separate DLA. The
updated CPU microcode may also be available as part of a system firmware
("BIOS") update.

In addition, this update includes a fix for a regression causing
deadlocks inside the loopback driver, which was introduced by the update
to 4.9.168 in the last security update.

For Debian 8 "Jessie", these problems have been fixed in version
4.9.168-1+deb9u2~deb8u1.

We recommend that you upgrade your linux-4.9 packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS


Ben Hutchings - Debian developer, member of kernel, installer and LTS teams

OSVersionArchitecturePackageVersionFilename
Debian8alllinux-4.9< 4.9.168-1+deb9u2~deb8u1linux-4.9_4.9.168-1+deb9u2~deb8u1_all.deb