vulnerability
Ubuntu: (Multiple Advisories) (CVE-2017-5754): Firefox vulnerabilities
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:L/AC:M/Au:N/C:C/I:N/A:N) | Jan 3, 2018 | Jan 6, 2018 | Jan 23, 2025 |
Severity
5
CVSS
(AV:L/AC:M/Au:N/C:C/I:N/A:N)
Published
Jan 3, 2018
Added
Jan 6, 2018
Modified
Jan 23, 2025
Description
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache.
Solution(s)
ubuntu-upgrade-firefoxubuntu-upgrade-linux-image-3-13-0-139-genericubuntu-upgrade-linux-image-3-13-0-139-generic-lpaeubuntu-upgrade-linux-image-3-13-0-139-lowlatencyubuntu-upgrade-linux-image-3-13-0-142-genericubuntu-upgrade-linux-image-3-13-0-142-generic-lpaeubuntu-upgrade-linux-image-3-13-0-142-lowlatencyubuntu-upgrade-linux-image-3-13-0-142-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-142-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-142-powerpc-smpubuntu-upgrade-linux-image-3-13-0-142-powerpc64-embubuntu-upgrade-linux-image-3-13-0-142-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-132-genericubuntu-upgrade-linux-image-3-2-0-132-generic-paeubuntu-upgrade-linux-image-4-13-0-1005-azureubuntu-upgrade-linux-image-4-13-0-1006-azureubuntu-upgrade-linux-image-4-13-0-1006-gcpubuntu-upgrade-linux-image-4-13-0-1007-gcpubuntu-upgrade-linux-image-4-13-0-1015-oemubuntu-upgrade-linux-image-4-13-0-1015-raspi2ubuntu-upgrade-linux-image-4-13-0-1017-oemubuntu-upgrade-linux-image-4-13-0-25-genericubuntu-upgrade-linux-image-4-13-0-25-lowlatencyubuntu-upgrade-linux-image-4-13-0-26-genericubuntu-upgrade-linux-image-4-13-0-26-generic-lpaeubuntu-upgrade-linux-image-4-13-0-26-lowlatencyubuntu-upgrade-linux-image-4-13-0-31-genericubuntu-upgrade-linux-image-4-13-0-31-lowlatencyubuntu-upgrade-linux-image-4-13-0-37-genericubuntu-upgrade-linux-image-4-13-0-37-generic-lpaeubuntu-upgrade-linux-image-4-13-0-37-lowlatencyubuntu-upgrade-linux-image-4-4-0-1009-awsubuntu-upgrade-linux-image-4-4-0-1011-awsubuntu-upgrade-linux-image-4-4-0-1015-kvmubuntu-upgrade-linux-image-4-4-0-1047-awsubuntu-upgrade-linux-image-4-4-0-1049-awsubuntu-upgrade-linux-image-4-4-0-108-genericubuntu-upgrade-linux-image-4-4-0-108-lowlatencyubuntu-upgrade-linux-image-4-4-0-111-genericubuntu-upgrade-linux-image-4-4-0-111-lowlatencyubuntu-upgrade-linux-image-4-4-0-111-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-111-powerpc-smpubuntu-upgrade-linux-image-4-4-0-111-powerpc64-embubuntu-upgrade-linux-image-4-4-0-111-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-112-genericubuntu-upgrade-linux-image-4-4-0-112-generic-lpaeubuntu-upgrade-linux-image-4-4-0-112-lowlatencyubuntu-upgrade-linux-image-4-4-0-112-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-112-powerpc-smpubuntu-upgrade-linux-image-4-4-0-112-powerpc64-embubuntu-upgrade-linux-image-4-4-0-112-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-9021-euclidubuntu-upgrade-linux-image-4-4-0-9023-euclidubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-euclidubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2
References
- CVE-2017-5754
- https://attackerkb.com/topics/CVE-2017-5754
- DEBIAN-DSA-4078
- DEBIAN-DSA-4082
- DEBIAN-DSA-4120
- NVD-CVE-2017-5754
- UBUNTU-USN-3516-1
- UBUNTU-USN-3521-1
- UBUNTU-USN-3522-1
- UBUNTU-USN-3522-2
- UBUNTU-USN-3522-3
- UBUNTU-USN-3522-4
- UBUNTU-USN-3523-1
- UBUNTU-USN-3523-2
- UBUNTU-USN-3524-1
- UBUNTU-USN-3524-2
- UBUNTU-USN-3525-1
- UBUNTU-USN-3530-1
- UBUNTU-USN-3531-1
- UBUNTU-USN-3531-3
- UBUNTU-USN-3540-1
- UBUNTU-USN-3540-2
- UBUNTU-USN-3541-1
- UBUNTU-USN-3541-2
- UBUNTU-USN-3542-1
- UBUNTU-USN-3542-2
- UBUNTU-USN-3549-1
- UBUNTU-USN-3560-1
- UBUNTU-USN-3561-1
- UBUNTU-USN-3580-1
- UBUNTU-USN-3581-1
- UBUNTU-USN-3581-2
- UBUNTU-USN-3582-1
- UBUNTU-USN-3582-2
- UBUNTU-USN-3583-1
- UBUNTU-USN-3594-1
- UBUNTU-USN-3597-1
- UBUNTU-USN-3597-2
- UBUNTU-USN-3620-2
- UBUNTU-USN-3690-1
- UBUNTU-USN-3777-3

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.