vulnerability

Ubuntu: (Multiple Advisories) (CVE-2018-3620): Linux kernel vulnerabilities

Severity
5
CVSS
(AV:L/AC:M/Au:N/C:C/I:N/A:N)
Published
Aug 15, 2018
Added
Aug 18, 2018
Modified
Aug 18, 2025

Description

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

Solutions

ubuntu-upgrade-linux-image-3-13-0-155-genericubuntu-upgrade-linux-image-3-13-0-155-generic-lpaeubuntu-upgrade-linux-image-3-13-0-155-lowlatencyubuntu-upgrade-linux-image-3-13-0-155-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-155-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-155-powerpc-smpubuntu-upgrade-linux-image-3-13-0-155-powerpc64-embubuntu-upgrade-linux-image-3-13-0-155-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-137-genericubuntu-upgrade-linux-image-3-2-0-137-generic-paeubuntu-upgrade-linux-image-3-2-0-137-highbankubuntu-upgrade-linux-image-3-2-0-137-omapubuntu-upgrade-linux-image-3-2-0-137-powerpc-smpubuntu-upgrade-linux-image-3-2-0-137-powerpc64-smpubuntu-upgrade-linux-image-3-2-0-137-virtualubuntu-upgrade-linux-image-4-15-0-1015-oemubuntu-upgrade-linux-image-4-15-0-1017-gcpubuntu-upgrade-linux-image-4-15-0-1019-awsubuntu-upgrade-linux-image-4-15-0-1019-kvmubuntu-upgrade-linux-image-4-15-0-1020-raspi2ubuntu-upgrade-linux-image-4-15-0-1021-azureubuntu-upgrade-linux-image-4-15-0-32-genericubuntu-upgrade-linux-image-4-15-0-32-generic-lpaeubuntu-upgrade-linux-image-4-15-0-32-lowlatencyubuntu-upgrade-linux-image-4-15-0-32-snapdragonubuntu-upgrade-linux-image-4-4-0-1027-awsubuntu-upgrade-linux-image-4-4-0-1031-kvmubuntu-upgrade-linux-image-4-4-0-1065-awsubuntu-upgrade-linux-image-4-4-0-1094-raspi2ubuntu-upgrade-linux-image-4-4-0-1098-snapdragonubuntu-upgrade-linux-image-4-4-0-133-genericubuntu-upgrade-linux-image-4-4-0-133-generic-lpaeubuntu-upgrade-linux-image-4-4-0-133-lowlatencyubuntu-upgrade-linux-image-4-4-0-133-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-133-powerpc-smpubuntu-upgrade-linux-image-4-4-0-133-powerpc64-embubuntu-upgrade-linux-image-4-4-0-133-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-generic-paeubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-highbankubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-omapubuntu-upgrade-linux-image-powerpcubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragonubuntu-upgrade-linux-image-virtualubuntu-upgrade-linux-image-virtual-hwe-16-04

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.