vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-5715): Firefox vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:M/Au:N/C:P/I:N/A:N) | Jan 4, 2018 | Jan 6, 2018 | Jan 23, 2025 |
Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
Jan 4, 2018
Added
Jan 6, 2018
Modified
Jan 23, 2025
Description
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Solution(s)
ubuntu-upgrade-amd64-microcodeubuntu-upgrade-firefoxubuntu-upgrade-intel-microcodeubuntu-upgrade-libjavascriptcoregtk-4-0-18ubuntu-upgrade-libvirt-binubuntu-upgrade-libvirt0ubuntu-upgrade-libwebkit2gtk-4-0-37ubuntu-upgrade-linux-image-3-13-0-140-genericubuntu-upgrade-linux-image-3-13-0-141-genericubuntu-upgrade-linux-image-3-13-0-141-lowlatencyubuntu-upgrade-linux-image-3-13-0-143-genericubuntu-upgrade-linux-image-3-13-0-143-generic-lpaeubuntu-upgrade-linux-image-3-13-0-143-lowlatencyubuntu-upgrade-linux-image-3-13-0-144-genericubuntu-upgrade-linux-image-3-13-0-144-generic-lpaeubuntu-upgrade-linux-image-3-2-0-133-genericubuntu-upgrade-linux-image-3-2-0-133-generic-paeubuntu-upgrade-linux-image-4-13-0-1006-azureubuntu-upgrade-linux-image-4-13-0-1007-gcpubuntu-upgrade-linux-image-4-13-0-1011-azureubuntu-upgrade-linux-image-4-13-0-1011-gcpubuntu-upgrade-linux-image-4-13-0-1015-raspi2ubuntu-upgrade-linux-image-4-13-0-1017-oemubuntu-upgrade-linux-image-4-13-0-1021-oemubuntu-upgrade-linux-image-4-13-0-31-genericubuntu-upgrade-linux-image-4-13-0-31-lowlatencyubuntu-upgrade-linux-image-4-13-0-36-genericubuntu-upgrade-linux-image-4-13-0-36-generic-lpaeubuntu-upgrade-linux-image-4-13-0-36-lowlatencyubuntu-upgrade-linux-image-4-13-0-37-genericubuntu-upgrade-linux-image-4-13-0-37-generic-lpaeubuntu-upgrade-linux-image-4-13-0-37-lowlatencyubuntu-upgrade-linux-image-4-15-0-1025-azureubuntu-upgrade-linux-image-4-4-0-1011-awsubuntu-upgrade-linux-image-4-4-0-1014-awsubuntu-upgrade-linux-image-4-4-0-1017-kvmubuntu-upgrade-linux-image-4-4-0-1019-kvmubuntu-upgrade-linux-image-4-4-0-1049-awsubuntu-upgrade-linux-image-4-4-0-1052-awsubuntu-upgrade-linux-image-4-4-0-1085-raspi2ubuntu-upgrade-linux-image-4-4-0-1087-snapdragonubuntu-upgrade-linux-image-4-4-0-111-genericubuntu-upgrade-linux-image-4-4-0-111-lowlatencyubuntu-upgrade-linux-image-4-4-0-111-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-111-powerpc-smpubuntu-upgrade-linux-image-4-4-0-111-powerpc64-embubuntu-upgrade-linux-image-4-4-0-111-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-112-genericubuntu-upgrade-linux-image-4-4-0-112-generic-lpaeubuntu-upgrade-linux-image-4-4-0-112-lowlatencyubuntu-upgrade-linux-image-4-4-0-112-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-112-powerpc-smpubuntu-upgrade-linux-image-4-4-0-112-powerpc64-embubuntu-upgrade-linux-image-4-4-0-112-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-116-genericubuntu-upgrade-linux-image-4-4-0-116-generic-lpaeubuntu-upgrade-linux-image-4-4-0-116-lowlatencyubuntu-upgrade-linux-image-4-4-0-116-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-116-powerpc-smpubuntu-upgrade-linux-image-4-4-0-116-powerpc64-embubuntu-upgrade-linux-image-4-4-0-116-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-9023-euclidubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-euclidubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-qemu-systemubuntu-upgrade-qemu-system-s390xubuntu-upgrade-qemu-system-x86
References
- CVE-2017-5715
- https://attackerkb.com/topics/CVE-2017-5715
- DEBIAN-DSA-4120
- DEBIAN-DSA-4187
- DEBIAN-DSA-4188
- DEBIAN-DSA-4213
- NVD-CVE-2017-5715
- UBUNTU-USN-3516-1
- UBUNTU-USN-3530-1
- UBUNTU-USN-3531-1
- UBUNTU-USN-3531-2
- UBUNTU-USN-3531-3
- UBUNTU-USN-3540-1
- UBUNTU-USN-3540-2
- UBUNTU-USN-3541-1
- UBUNTU-USN-3541-2
- UBUNTU-USN-3542-1
- UBUNTU-USN-3542-2
- UBUNTU-USN-3549-1
- UBUNTU-USN-3560-1
- UBUNTU-USN-3561-1
- UBUNTU-USN-3580-1
- UBUNTU-USN-3581-1
- UBUNTU-USN-3581-2
- UBUNTU-USN-3582-1
- UBUNTU-USN-3582-2
- UBUNTU-USN-3594-1
- UBUNTU-USN-3597-1
- UBUNTU-USN-3597-2
- UBUNTU-USN-3620-2
- UBUNTU-USN-3690-1
- UBUNTU-USN-3690-2
- UBUNTU-USN-3777-3
- UBUNTU-USN-4985-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.