vulnerability
Amazon Linux AMI 2: CVE-2017-5715: Security patch for kernel, libvirt, linux-firmware, microcode_ctl, qemu-kvm (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | 2018-01-04 | 2020-04-27 | 2024-11-27 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
2018-01-04
Added
2020-04-27
Modified
2024-11-27
Description
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Solution(s)
amazon-linux-ami-2-upgrade-iwl100-firmwareamazon-linux-ami-2-upgrade-iwl1000-firmwareamazon-linux-ami-2-upgrade-iwl105-firmwareamazon-linux-ami-2-upgrade-iwl135-firmwareamazon-linux-ami-2-upgrade-iwl2000-firmwareamazon-linux-ami-2-upgrade-iwl2030-firmwareamazon-linux-ami-2-upgrade-iwl3160-firmwareamazon-linux-ami-2-upgrade-iwl3945-firmwareamazon-linux-ami-2-upgrade-iwl4965-firmwareamazon-linux-ami-2-upgrade-iwl5000-firmwareamazon-linux-ami-2-upgrade-iwl5150-firmwareamazon-linux-ami-2-upgrade-iwl6000-firmwareamazon-linux-ami-2-upgrade-iwl6000g2a-firmwareamazon-linux-ami-2-upgrade-iwl6000g2b-firmwareamazon-linux-ami-2-upgrade-iwl6050-firmwareamazon-linux-ami-2-upgrade-iwl7260-firmwareamazon-linux-ami-2-upgrade-iwl7265-firmwareamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-docamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-libvirtamazon-linux-ami-2-upgrade-libvirt-adminamazon-linux-ami-2-upgrade-libvirt-clientamazon-linux-ami-2-upgrade-libvirt-daemonamazon-linux-ami-2-upgrade-libvirt-daemon-config-networkamazon-linux-ami-2-upgrade-libvirt-daemon-config-nwfilteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-interfaceamazon-linux-ami-2-upgrade-libvirt-daemon-driver-lxcamazon-linux-ami-2-upgrade-libvirt-daemon-driver-networkamazon-linux-ami-2-upgrade-libvirt-daemon-driver-nodedevamazon-linux-ami-2-upgrade-libvirt-daemon-driver-nwfilteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-qemuamazon-linux-ami-2-upgrade-libvirt-daemon-driver-secretamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storageamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-coreamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-diskamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-glusteramazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-iscsiamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-logicalamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-mpathamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-rbdamazon-linux-ami-2-upgrade-libvirt-daemon-driver-storage-scsiamazon-linux-ami-2-upgrade-libvirt-daemon-kvmamazon-linux-ami-2-upgrade-libvirt-daemon-lxcamazon-linux-ami-2-upgrade-libvirt-debuginfoamazon-linux-ami-2-upgrade-libvirt-develamazon-linux-ami-2-upgrade-libvirt-docsamazon-linux-ami-2-upgrade-libvirt-libsamazon-linux-ami-2-upgrade-libvirt-lock-sanlockamazon-linux-ami-2-upgrade-libvirt-login-shellamazon-linux-ami-2-upgrade-libvirt-nssamazon-linux-ami-2-upgrade-linux-firmwareamazon-linux-ami-2-upgrade-microcode_ctlamazon-linux-ami-2-upgrade-microcode_ctl-debuginfoamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfoamazon-linux-ami-2-upgrade-qemu-imgamazon-linux-ami-2-upgrade-qemu-kvmamazon-linux-ami-2-upgrade-qemu-kvm-commonamazon-linux-ami-2-upgrade-qemu-kvm-debuginfoamazon-linux-ami-2-upgrade-qemu-kvm-tools

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.