Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly compute a speculative execution limit on pointer arithmetic in
some situations. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2020-27171)
Piotr Krysiuk discovered that the BPF subsystem in the Linux kernel did not
properly apply speculative execution limits on some pointer types. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-27170)
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1015-dell300x | <Â 4.15.0-1015.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1015-dell300x-dbgsym | <Â 4.15.0-1015.19 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1068-oracle | <Â 4.15.0-1068.76 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1068-oracle-dbgsym | <Â 4.15.0-1068.76 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1082-raspi2 | <Â 4.15.0-1082.87 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-buildinfo-4.15.0-1082-raspi2 | <Â 4.15.0-1082.87 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-headers-4.15.0-1082-raspi2 | <Â 4.15.0-1082.87 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-image-4.15.0-1082-raspi2-dbgsym | <Â 4.15.0-1082.87 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-modules-4.15.0-1082-raspi2 | <Â 4.15.0-1082.87 | UNKNOWN |
Ubuntu | 18.04 | noarch | linux-raspi2-headers-4.15.0-1082 | <Â 4.15.0-1082.87 | UNKNOWN |