USN-7860-1

Source
https://ubuntu.com/security/notices/USN-7860-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7860-1
Upstream
Related
Published
2025-11-06T09:02:26Z
Modified
2026-02-10T04:50:21Z
Summary
linux, linux-aws, linux-aws-6.14, linux-gcp, linux-gcp-6.14, linux-oem-6.14, linux-oracle, linux-oracle-6.14, linux-raspi, linux-realtime vulnerability
Details

Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain processors. This flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this to expose sensitive information from the host OS.

References

Affected packages

Ubuntu:24.04:LTS / linux-aws-6.14

Package

Name
linux-aws-6.14
Purl
pkg:deb/ubuntu/linux-aws-6.14@6.14.0-1016.16~24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.14.0-1016.16~24.04.1

Affected versions

6.*
6.14.0-1007.7~24.04.1
6.14.0-1009.9~24.04.1
6.14.0-1010.10~24.04.1
6.14.0-1011.11~24.04.1
6.14.0-1012.12~24.04.1
6.14.0-1013.13~24.04.1
6.14.0-1014.14~24.04.1
6.14.0-1015.15~24.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-aws-6.14-cloud-tools-6.14.0-1016",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-aws-6.14-headers-6.14.0-1016",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-aws-6.14-tools-6.14.0-1016",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-buildinfo-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-buildinfo-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-cloud-tools-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1016-aws",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1016-aws-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        }
    ]
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40300"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"

Ubuntu:24.04:LTS / linux-gcp-6.14

Package

Name
linux-gcp-6.14
Purl
pkg:deb/ubuntu/linux-gcp-6.14@6.14.0-1019.20~24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.14.0-1019.20~24.04.1

Affected versions

6.*
6.14.0-1007.7~24.04.1
6.14.0-1011.11~24.04.1
6.14.0-1012.12~24.04.1
6.14.0-1014.15~24.04.1
6.14.0-1015.16~24.04.1
6.14.0-1016.17~24.04.1
6.14.0-1017.18~24.04.1
6.14.0-1018.19~24.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-buildinfo-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-gcp-6.14-headers-6.14.0-1019",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-gcp-6.14-tools-6.14.0-1019",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-lib-rust-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1019-gcp",
            "binary_version": "6.14.0-1019.20~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1019-gcp-64k",
            "binary_version": "6.14.0-1019.20~24.04.1"
        }
    ]
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40300"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"

Ubuntu:24.04:LTS / linux-oem-6.14

Package

Name
linux-oem-6.14
Purl
pkg:deb/ubuntu/linux-oem-6.14@6.14.0-1015.15?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.14.0-1015.15

Affected versions

6.*
6.14.0-1004.4
6.14.0-1005.5
6.14.0-1006.6
6.14.0-1007.7
6.14.0-1008.8
6.14.0-1010.10
6.14.0-1011.11
6.14.0-1012.12
6.14.0-1013.13
6.14.0-1014.14

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-headers-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-ipu6-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-ipu7-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-iwlwifi-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-usbio-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-modules-vision-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-oem-6.14-headers-6.14.0-1015",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-oem-6.14-tools-6.14.0-1015",
            "binary_version": "6.14.0-1015.15"
        },
        {
            "binary_name": "linux-tools-6.14.0-1015-oem",
            "binary_version": "6.14.0-1015.15"
        }
    ]
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40300"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"

Ubuntu:24.04:LTS / linux-oracle-6.14

Package

Name
linux-oracle-6.14
Purl
pkg:deb/ubuntu/linux-oracle-6.14@6.14.0-1016.16~24.04.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.14.0-1016.16~24.04.1

Affected versions

6.*
6.14.0-1007.7~24.04.1
6.14.0-1009.9~24.04.1
6.14.0-1010.10~24.04.1
6.14.0-1011.11~24.04.1
6.14.0-1012.12~24.04.1
6.14.0-1013.13~24.04.1
6.14.0-1014.14~24.04.1
6.14.0-1015.15~24.04.1

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "linux-buildinfo-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-buildinfo-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-headers-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-image-unsigned-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-modules-extra-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-oracle-6.14-headers-6.14.0-1016",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-oracle-6.14-tools-6.14.0-1016",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1016-oracle",
            "binary_version": "6.14.0-1016.16~24.04.1"
        },
        {
            "binary_name": "linux-tools-6.14.0-1016-oracle-64k",
            "binary_version": "6.14.0-1016.16~24.04.1"
        }
    ]
}

Database specific

cves_map
{
    "ecosystem": "Ubuntu:24.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                    "type": "CVSS_V3"
                },
                {
                    "score": "high",
                    "type": "Ubuntu"
                }
            ],
            "id": "CVE-2025-40300"
        }
    ]
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"