{"id":21708,"date":"2018-01-10T02:34:24","date_gmt":"2018-01-09T17:34:24","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3521-1-nvidia-graphics-drivers-vulnerability\/"},"modified":"2018-01-10T02:34:24","modified_gmt":"2018-01-09T17:34:24","slug":"usn-3521-1-nvidia-graphics-drivers-vulnerability","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3521-1-nvidia-graphics-drivers-vulnerability\/","title":{"rendered":"USN-3521-1: NVIDIA graphics drivers vulnerability"},"content":{"rendered":"<p>USN-3521-1: NVIDIA graphics drivers vulnerability<\/p>\n<h2>Ubuntu Security Notice USN-3521-1<\/h2>\n<p><em>9th January, 2018<\/em><\/p>\n<h3>nvidia-graphics-drivers-384 vulnerability<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.10<\/li>\n<li>Ubuntu 17.04<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>The system could be made to expose sensitive information.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>nvidia-graphics-drivers-384<br \/>\n    &#8211; NVIDIA binary X.Org driver<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>Jann Horn discovered that microprocessors utilizing speculative execution<br \/>and branch prediction may allow unauthorized memory reads via sidechannel<br \/>attacks. This flaw is known as Spectre. A local attacker could use this to<br \/>expose sensitive information, including kernel memory.<\/p>\n<p>This update provides mitigations to address the issue, along with<br \/>compatibility fixes for the corresponding Linux kernel updates.<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 17.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\">nvidia-384<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\/384.111-0ubuntu0.17.10.1\">384.111-0ubuntu0.17.10.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 17.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\">nvidia-384<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\/384.111-0ubuntu0.17.04.1\">384.111-0ubuntu0.17.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\">nvidia-384<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\/384.111-0ubuntu0.16.04.1\">384.111-0ubuntu0.16.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\">nvidia-384<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/nvidia-graphics-drivers-384\/384.111-0ubuntu0.14.04.1\">384.111-0ubuntu0.14.04.1<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to reboot your computer to make<br \/>all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5753\">CVE-2017-5753<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3521-1\/\" target=\"_blank\">USN-3521-1: NVIDIA graphics drivers vulnerability<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3521-1: NVIDIA graphics drivers vulnerability Ubuntu Security Notice USN-3521-1 9th January, 2018 nvidia-graphics-drivers-384 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.10 Ubuntu 17.04 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary The system could be made to expose sensitive information. Software description nvidia-graphics-drivers-384 &#8211; NVIDIA binary X.Org driver Details Jann Horn discovered that microprocessors utilizing speculative executionand branch prediction may allow unauthorized memory reads via sidechannelattacks. This flaw is known as Spectre. A local attacker could use this toexpose sensitive information, including kernel memory. This update provides mitigations to address the issue, along withcompatibility fixes for the corresponding Linux kernel updates. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 17.10: nvidia-384 384.111-0ubuntu0.17.10.1 Ubuntu 17.04: nvidia-384 384.111-0ubuntu0.17.04.1 Ubuntu 16.04 LTS: nvidia-384 384.111-0ubuntu0.16.04.1 Ubuntu 14.04 LTS: nvidia-384 384.111-0ubuntu0.14.04.1 <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3521-1-nvidia-graphics-drivers-vulnerability\/\" title=\"USN-3521-1: NVIDIA graphics drivers vulnerability\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-21708","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/21708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=21708"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/21708\/revisions"}],"predecessor-version":[{"id":21709,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/21708\/revisions\/21709"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=21708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=21708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=21708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}