Description
Systems with microprocessors utilizing speculative execution and branch
prediction may allow unauthorized disclosure of information to an attacker
with local user access via a speculative buffer overflow and side-channel
analysis.
Notes
tyhicks | Also known as "Bounds Check Bypass Store"
This issue is mitigated using the same techniques as CVE-2017-5753.
Ubuntu and the rest of the Linux kernel community will continue to monitor
for vulnerable instances in the kernel and insert speculation barriers, as
needed. |
Package
Upstream: | released
(60.0)
|
Ubuntu 18.04 LTS: | not-affected
(63.0+build2-0ubuntu0.18.04.2)
|
Ubuntu 16.04 ESM: | not-affected
(63.0+build2-0ubuntu0.16.04.2)
|
Ubuntu 14.04 ESM: | DNE
(trusty was not-affected [63.0+build2-0ubuntu0.14.04.2])
|
Patches:
Package
Upstream: | released
|
Ubuntu 18.04 LTS: | released
(3.20180312.0~ubuntu18.04.1)
|
Ubuntu 16.04 ESM: | released
(3.20180312.0~ubuntu16.04.1)
|
Ubuntu 14.04 ESM: | released
(3.20180312.0~ubuntu14.04.1)
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.13.0-32.35)
|
Ubuntu 16.04 ESM: | released
(4.4.0-112.135)
|
Ubuntu 14.04 ESM: | released
(3.13.0-157.207)
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1049.58)
|
Ubuntu 14.04 ESM: | released
(4.4.0-1011.11)
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1013.13~16.04.2)
|
Ubuntu 14.04 ESM: | not-affected
(4.15.0-1023.24~14.04.1)
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-1004.4~18.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1001.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-1014.14~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
|
Ubuntu 16.04 ESM: | released
(4.15.0-24.26~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.18.0-11.12~18.04.1)
|
Ubuntu 16.04 ESM: | released
(4.15.0-24.26~16.04.1)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.2)
|
Ubuntu 16.04 ESM: | released
(4.4.0-1017.22)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [out of standard support])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(4.4.0-111.134~14.04.1)
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | DNE
(trusty was ignored [abandoned])
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1002.3)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Package
Upstream: | released
(4.16~rc1)
|
Ubuntu 18.04 LTS: | not-affected
(4.15.0-1006.7)
|
Ubuntu 14.04 ESM: | DNE
|
Patches:
Updated: 2022-06-10 14:03:06 UTC (commit 22cd97abab61e5eccab4070a258ab5d6a94b972b)