First published: Fri Feb 01 2019(Updated: )
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | <4.19.19 | |
Linux Kernel | >=4.20.0<4.20.6 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 | |
SUSE Linux | =15.0 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.129-1 6.1.135-1 6.12.22-1 6.12.25-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-7308 is classified as a medium-severity vulnerability due to potential exposure to side-channel attacks.
To fix CVE-2019-7308, upgrade the Linux kernel to version 4.20.6 or later.
CVE-2019-7308 affects Linux kernel versions prior to 4.20.6 and 4.19.19 and older.
Yes, CVE-2019-7308 affects multiple distributions, including Ubuntu 14.04, 16.04, 18.04, 18.10, and openSUSE Leap 15.0.
CVE-2019-7308 may be exploited via local access, making it a notable concern for system security.