First published: Tue Jan 09 2018(Updated: )
Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory. This update provides mitigations to address the issue, along with compatibility fixes for the corresponding Linux kernel updates.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/nvidia-384 | <384.111-0ubuntu0.17.10.1 | 384.111-0ubuntu0.17.10.1 |
=17.10 | ||
All of | ||
ubuntu/nvidia-384 | <384.111-0ubuntu0.17.04.1 | 384.111-0ubuntu0.17.04.1 |
=17.04 | ||
All of | ||
ubuntu/nvidia-384 | <384.111-0ubuntu0.16.04.1 | 384.111-0ubuntu0.16.04.1 |
=16.04 | ||
All of | ||
ubuntu/nvidia-384 | <384.111-0ubuntu0.14.04.1 | 384.111-0ubuntu0.14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in USN-3521-1 is known as Spectre, which allows unauthorized memory reads via side-channel attacks.
The vulnerability affects NVIDIA graphics drivers by enabling local attackers to expose sensitive information, including kernel memory.
Versions 17.10, 17.04, 16.04, and 14.04 of Ubuntu are affected by the vulnerability in USN-3521-1.
To fix the vulnerability, update your nvidia-384 package to version 384.111-0ubuntu0.17.10.1 (for Ubuntu 17.10), 384.111-0ubuntu0.17.04.1 (for Ubuntu 17.04), 384.111-0ubuntu0.16.04.1 (for Ubuntu 16.04), or 384.111-0ubuntu0.14.04.1 (for Ubuntu 14.04).
You can find more details about the vulnerability in USN-3521-1 on the Ubuntu website at https://ubuntu.com/security/CVE-2017-5753, https://ubuntu.com/security/notices/USN-3530-1, and https://ubuntu.com/security/notices/USN-3580-1.