CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.4%
Andrei Vlad Lutas and Dan Lutas discovered that some x86 processors
incorrectly handle SWAPGS instructions during speculative execution. A
local attacker could use this to expose sensitive information (kernel
memory).
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Ubuntu | 19.04 | noarch | linux-image-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-aws-headers-5.0.0-1012 | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-aws-tools-5.0.0-1012 | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-buildinfo-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-headers-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-image-5.0.0-1012-aws-dbgsym | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-modules-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-modules-extra-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-tools-5.0.0-1012-aws | < 5.0.0-1012.13 | UNKNOWN |
Ubuntu | 19.04 | noarch | linux-image-aws | < 5.0.0.1012.12 | UNKNOWN |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
46.4%