Debian: DSA-4444-1: linux security update

    Date14 May 2019
    CategoryDebian
    5892
    Posted ByLinuxSecurity Advisories
    Multiple researchers have discovered vulnerabilities in the way the Intel processor designs have implemented speculative forwarding of data filled into temporary microarchitectural structures (buffers). This flaw could allow an attacker controlling an unprivileged process to
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4444-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    May 14, 2019                          https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : linux
    CVE ID         : CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2019-11091
    Debian Bug     : 928125
    
    Multiple researchers have discovered vulnerabilities in the way the
    Intel processor designs have implemented speculative forwarding of data
    filled into temporary microarchitectural structures (buffers). This
    flaw could allow an attacker controlling an unprivileged process to
    read sensitive information, including from the kernel and all other
    processes running on the system or cross guest/host boundaries to read
    host memory.
    
    See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html
    for more details.
    
    To fully resolve these vulnerabilities it is also necessary to install
    updated CPU microcode. An updated intel-microcode package (only
    available in Debian non-free) will be provided via a separate DSA. The
    updated CPU microcode may also be available as part of a system firmware
    ("BIOS") update.
    
    In addition, this update includes a fix for a regression causing
    deadlocks inside the loopback driver, which was introduced by the update
    to 4.9.168 in the last Stretch point release.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 4.9.168-1+deb9u2.
    
    We recommend that you upgrade your linux packages.
    
    For the detailed security status of linux please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/linux
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.