Jean-Claude Graf, Sandro Rüegge, Ali Hajiabadi, and Kaveh Razavi discovered that the Linux kernel contained insufficient branch predictor isolation between a guest and a userspace hypervisor for certain processors. This flaw is known as VMSCAPE. An attacker in a guest VM could possibly use this to expose sensitive information from the host OS.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-aws-6.14-cloud-tools-6.14.0-1016",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-aws-6.14-headers-6.14.0-1016",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-aws-6.14-tools-6.14.0-1016",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-cloud-tools-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1016-aws",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1016-aws-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2025-40300"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-gcp-6.14-headers-6.14.0-1019",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-gcp-6.14-tools-6.14.0-1019",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-lib-rust-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1019-gcp",
"binary_version": "6.14.0-1019.20~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1019-gcp-64k",
"binary_version": "6.14.0-1019.20~24.04.1"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2025-40300"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-headers-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-ipu6-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-ipu7-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-iwlwifi-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-usbio-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-modules-vision-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-oem-6.14-headers-6.14.0-1015",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-oem-6.14-tools-6.14.0-1015",
"binary_version": "6.14.0-1015.15"
},
{
"binary_name": "linux-tools-6.14.0-1015-oem",
"binary_version": "6.14.0-1015.15"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2025-40300"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "linux-buildinfo-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-buildinfo-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-headers-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-image-unsigned-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-modules-extra-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-oracle-6.14-headers-6.14.0-1016",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-oracle-6.14-tools-6.14.0-1016",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1016-oracle",
"binary_version": "6.14.0-1016.16~24.04.1"
},
{
"binary_name": "linux-tools-6.14.0-1016-oracle-64k",
"binary_version": "6.14.0-1016.16~24.04.1"
}
]
}
{
"ecosystem": "Ubuntu:24.04:LTS",
"cves": [
{
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "high",
"type": "Ubuntu"
}
],
"id": "CVE-2025-40300"
}
]
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7860-1.json"