Rapid7 Vulnerability & Exploit Database

Ubuntu: (Multiple Advisories) (CVE-2020-10767): Linux kernel vulnerabilities

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Ubuntu: (Multiple Advisories) (CVE-2020-10767): Linux kernel vulnerabilities

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
06/19/2020
Created
08/07/2020
Added
08/05/2020
Modified
03/22/2023

Description

A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.

Solution(s)

  • ubuntu-upgrade-linux-image-4-15-0-1051-oracle
  • ubuntu-upgrade-linux-image-4-15-0-1067-gke
  • ubuntu-upgrade-linux-image-4-15-0-1068-raspi2
  • ubuntu-upgrade-linux-image-4-15-0-1072-kvm
  • ubuntu-upgrade-linux-image-4-15-0-1080-aws
  • ubuntu-upgrade-linux-image-4-15-0-1081-gcp
  • ubuntu-upgrade-linux-image-4-15-0-1084-snapdragon
  • ubuntu-upgrade-linux-image-4-15-0-1093-azure
  • ubuntu-upgrade-linux-image-4-15-0-1094-oem
  • ubuntu-upgrade-linux-image-4-15-0-115-generic
  • ubuntu-upgrade-linux-image-4-15-0-115-generic-lpae
  • ubuntu-upgrade-linux-image-4-15-0-115-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-1075-aws
  • ubuntu-upgrade-linux-image-4-4-0-1077-kvm
  • ubuntu-upgrade-linux-image-4-4-0-1111-aws
  • ubuntu-upgrade-linux-image-4-4-0-1136-raspi2
  • ubuntu-upgrade-linux-image-4-4-0-1140-snapdragon
  • ubuntu-upgrade-linux-image-4-4-0-186-generic
  • ubuntu-upgrade-linux-image-4-4-0-186-generic-lpae
  • ubuntu-upgrade-linux-image-4-4-0-186-lowlatency
  • ubuntu-upgrade-linux-image-4-4-0-186-powerpc-e500mc
  • ubuntu-upgrade-linux-image-4-4-0-186-powerpc-smp
  • ubuntu-upgrade-linux-image-4-4-0-186-powerpc64-emb
  • ubuntu-upgrade-linux-image-4-4-0-186-powerpc64-smp
  • ubuntu-upgrade-linux-image-5-0-0-1045-gke
  • ubuntu-upgrade-linux-image-5-0-0-1065-oem-osp1
  • ubuntu-upgrade-linux-image-5-3-0-1030-oracle
  • ubuntu-upgrade-linux-image-5-3-0-1030-raspi2
  • ubuntu-upgrade-linux-image-5-3-0-1032-aws
  • ubuntu-upgrade-linux-image-5-3-0-1032-gcp
  • ubuntu-upgrade-linux-image-5-3-0-1032-gke
  • ubuntu-upgrade-linux-image-5-3-0-1034-azure
  • ubuntu-upgrade-linux-image-5-3-0-64-generic
  • ubuntu-upgrade-linux-image-5-3-0-64-generic-lpae
  • ubuntu-upgrade-linux-image-5-3-0-64-lowlatency
  • ubuntu-upgrade-linux-image-5-4-0-1016-raspi
  • ubuntu-upgrade-linux-image-5-4-0-1022-aws
  • ubuntu-upgrade-linux-image-5-4-0-1022-gcp
  • ubuntu-upgrade-linux-image-5-4-0-1022-oracle
  • ubuntu-upgrade-linux-image-5-4-0-1023-azure
  • ubuntu-upgrade-linux-image-5-4-0-45-generic
  • ubuntu-upgrade-linux-image-5-4-0-45-generic-lpae
  • ubuntu-upgrade-linux-image-5-4-0-45-lowlatency
  • ubuntu-upgrade-linux-image-aws
  • ubuntu-upgrade-linux-image-aws-edge
  • ubuntu-upgrade-linux-image-aws-hwe
  • ubuntu-upgrade-linux-image-aws-lts-18-04
  • ubuntu-upgrade-linux-image-azure
  • ubuntu-upgrade-linux-image-azure-edge
  • ubuntu-upgrade-linux-image-azure-lts-18-04
  • ubuntu-upgrade-linux-image-gcp
  • ubuntu-upgrade-linux-image-gcp-lts-18-04
  • ubuntu-upgrade-linux-image-generic
  • ubuntu-upgrade-linux-image-generic-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-lpae
  • ubuntu-upgrade-linux-image-generic-lpae-hwe-18-04
  • ubuntu-upgrade-linux-image-generic-lpae-lts-xenial
  • ubuntu-upgrade-linux-image-generic-lts-xenial
  • ubuntu-upgrade-linux-image-gke
  • ubuntu-upgrade-linux-image-gke-4-15
  • ubuntu-upgrade-linux-image-gke-5-0
  • ubuntu-upgrade-linux-image-gke-5-3
  • ubuntu-upgrade-linux-image-gke-5-4
  • ubuntu-upgrade-linux-image-gkeop-5-3
  • ubuntu-upgrade-linux-image-gkeop-5-4
  • ubuntu-upgrade-linux-image-kvm
  • ubuntu-upgrade-linux-image-lowlatency
  • ubuntu-upgrade-linux-image-lowlatency-hwe-18-04
  • ubuntu-upgrade-linux-image-lowlatency-lts-xenial
  • ubuntu-upgrade-linux-image-oem
  • ubuntu-upgrade-linux-image-oem-osp1
  • ubuntu-upgrade-linux-image-oracle
  • ubuntu-upgrade-linux-image-oracle-lts-18-04
  • ubuntu-upgrade-linux-image-powerpc-e500mc
  • ubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc-smp
  • ubuntu-upgrade-linux-image-powerpc-smp-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-emb
  • ubuntu-upgrade-linux-image-powerpc64-emb-lts-xenial
  • ubuntu-upgrade-linux-image-powerpc64-smp
  • ubuntu-upgrade-linux-image-powerpc64-smp-lts-xenial
  • ubuntu-upgrade-linux-image-raspi
  • ubuntu-upgrade-linux-image-raspi-hwe-18-04
  • ubuntu-upgrade-linux-image-raspi2
  • ubuntu-upgrade-linux-image-raspi2-hwe-18-04
  • ubuntu-upgrade-linux-image-snapdragon
  • ubuntu-upgrade-linux-image-snapdragon-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual
  • ubuntu-upgrade-linux-image-virtual-hwe-18-04
  • ubuntu-upgrade-linux-image-virtual-lts-xenial

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;