USN-3549-1

Source
https://ubuntu.com/security/notices/USN-3549-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3549-1.json
JSON Data
https://api.test.osv.dev/v1/vulns/USN-3549-1
Upstream
Related
Published
2018-01-29T18:35:38.128619Z
Modified
2025-10-13T04:34:34Z
Summary
linux-kvm vulnerabilities
Details

Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. (CVE-2017-5715, CVE-2017-5753)

References

Affected packages

Ubuntu:16.04:LTS / linux-kvm

Package

Name
linux-kvm
Purl
pkg:deb/ubuntu/linux-kvm@4.4.0-1017.22?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.0-1017.22

Affected versions

4.*

4.4.0-1004.9
4.4.0-1007.12
4.4.0-1008.13
4.4.0-1009.14
4.4.0-1010.15
4.4.0-1012.17
4.4.0-1013.18
4.4.0-1015.20

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-cloud-tools-4.4.0-1017-kvm",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-headers-4.4.0-1017-kvm",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-image-4.4.0-1017-kvm",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-kvm-cloud-tools-4.4.0-1017",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-kvm-headers-4.4.0-1017",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-kvm-tools-4.4.0-1017",
            "binary_version": "4.4.0-1017.22"
        },
        {
            "binary_name": "linux-tools-4.4.0-1017-kvm",
            "binary_version": "4.4.0-1017.22"
        }
    ]
}

Database specific

cves_map

{
    "cves": [
        {
            "id": "CVE-2017-5715",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        },
        {
            "id": "CVE-2017-5753",
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ]
        }
    ],
    "ecosystem": "Ubuntu:16.04:LTS"
}