CVE-2018-3693

Priority
Description
Systems with microprocessors utilizing speculative execution and branch
prediction may allow unauthorized disclosure of information to an attacker
with local user access via a speculative buffer overflow and side-channel
analysis.
Notes
tyhicksAlso known as "Bounds Check Bypass Store"
This issue is mitigated using the same techniques as CVE-2017-5753.
Ubuntu and the rest of the Linux kernel community will continue to monitor
for vulnerable instances in the kernel and insert speculation barriers, as
needed.
Package
Upstream:released (60.0)
Ubuntu 18.04 LTS:not-affected (63.0+build2-0ubuntu0.18.04.2)
Ubuntu 16.04 ESM:not-affected (63.0+build2-0ubuntu0.16.04.2)
Ubuntu 14.04 ESM:DNE (trusty was not-affected [63.0+build2-0ubuntu0.14.04.2])
Patches:
Package
Upstream:released
Ubuntu 18.04 LTS:released (3.20180312.0~ubuntu18.04.1)
Ubuntu 16.04 ESM:released (3.20180312.0~ubuntu16.04.1)
Ubuntu 14.04 ESM:released (3.20180312.0~ubuntu14.04.1)
Patches:
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.13.0-32.35)
Ubuntu 16.04 ESM:released (4.4.0-112.135)
Ubuntu 14.04 ESM:released (3.13.0-157.207)
Patches:
Introduced by
1da177e4c3f41524e886b7f1b8a0c1fc7321cac2
Fixed by
f3804203306e098dae9ca51540fcd5eb700d7f40|local-2017-5753-intel
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:released (4.4.0-1049.58)
Ubuntu 14.04 ESM:released (4.4.0-1011.11)
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:released (4.15.0-1013.13~16.04.2)
Ubuntu 14.04 ESM:not-affected (4.15.0-1023.24~14.04.1)
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.18.0-1004.4~18.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1001.1)
Ubuntu 16.04 ESM:released (4.15.0-1014.14~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected
Ubuntu 16.04 ESM:released (4.15.0-24.26~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.18.0-11.12~18.04.1)
Ubuntu 16.04 ESM:released (4.15.0-24.26~16.04.1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.2)
Ubuntu 16.04 ESM:released (4.4.0-1017.22)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [out of standard support])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (4.4.0-111.134~14.04.1)
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:DNE (trusty was ignored [abandoned])
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1002.3)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected (4.15.0-1006.7)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:released (4.16~rc1)
Ubuntu 18.04 LTS:not-affected
Ubuntu 14.04 ESM:DNE
Patches:
More Information

Updated: 2022-06-10 14:03:06 UTC (commit 22cd97abab61e5eccab4070a258ab5d6a94b972b)