CVE-2017-5715
Published: 03 January 2018
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
From the Ubuntu security team
Jann Horn discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. A local attacker could use this to expose sensitive information, including kernel memory.
Priority
CVSS 3 base score: 5.6
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.13.0-32.35)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-112.135)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(3.13.0-141.190)
|
|
Patches: Introduced by 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Fixed by 76b043848fd22dbf7f8bf3a1452f8c70d557b860|local-2017-5715-intel |
||
linux-ti-omap4 Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-armadaxp Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-quantal Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-raring Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
This package is not directly supported by the Ubuntu Security Team | ||
linux-lts-trusty Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-goldfish Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Ignored
(was needs-triage now end-of-life)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-grouper Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-maguro Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-mako Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Ignored
(abandoned)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-manta Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-flo Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Ignored
(abandoned)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [abandoned])
|
|
linux-raspi2 Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1006.7)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-1085.93)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [out of standard support])
|
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [was pending now end-of-life])
|
|
linux-lts-wily Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was ignored [out of standard support])
|
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(4.4.0-111.134~14.04.1)
|
|
linux-snapdragon Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-1087.92)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-aws Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1001.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-1049.58)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(4.4.0-1011.11)
|
|
linux-hwe Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.13.0-31.34~16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.18.0-11.12~18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.13.0-31.34~16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-gke Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Ignored
(was pending now end-of-life)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-azure Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1002.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.13.0-1006.8)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Not vulnerable
(4.15.0-1023.24~14.04.1)
|
|
linux-gcp Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1001.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.13.0-1007.10)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-kvm Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1002.2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-1017.22)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-euclid Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.4.0-9023.24)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-oem Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.15.0-1002.3)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(4.13.0-1017.18)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
qemu-kvm Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Does not exist
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Does not exist
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
qemu Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(1:2.11+dfsg-1ubuntu2)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1:2.5+dfsg-5ubuntu10.20)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(2.0.0+dfsg-2ubuntu1.38)
|
|
libvirt Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.0.0-1ubuntu1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(1.3.1-1ubuntu10.17)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(1.2.2-0ubuntu13.1.25)
|
|
intel-microcode Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(3.20180108.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.20180312.0~ubuntu16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(3.20180312.0~ubuntu14.04.1)
|
|
amd64-microcode Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(3.20180524.1~ubuntu0.18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(3.20180524.1~ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(3.20180524.1~ubuntu0.14.04.1)
|
|
firefox Launchpad, Ubuntu, Debian |
Upstream |
Released
(57.0.4)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Released
(59.0.1+build1-0ubuntu1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(57.0.4+build1-0ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
(trusty was released [57.0.4+build1-0ubuntu0.14.04.1])
|
|
webkit2gtk Launchpad, Ubuntu, Debian |
Upstream |
Released
(2.18.5)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(2.18.6-1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Released
(2.18.5-0ubuntu0.16.04.1)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
linux-azure-edge Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.15~rc8)
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Not vulnerable
(4.18.0-1003.3~18.04.1)
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Not vulnerable
(4.15.0-1002.2)
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
Notes
Author | Note |
---|---|
tyhicks | Variant 2, aka "Spectre" |
mdeslaur | intel-microcode updates were reverted in usn-3531-2 |
tyhicks | The break-fix lines for this CVE are not complete since a large number of patches are required to mitigate this issue. The commit(s) listed are chosen as placeholders for automated CVE triage purposes. |
leosilva | Due to the lack of recent CPU models in qemu and the lack of microcode early-loading support in the precise kernel, we do not plan on backporting support for the new flag to QEMU and libvirt at this time. |
References
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715
- https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
- https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
- https://spectreattack.com/
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
- http://www.amd.com/en/corporate/speculative-execution
- https://developer.arm.com/support/security-update
- https://www.qemu.org/2018/01/04/spectre/
- https://www.qemu.org/2018/02/14/qemu-2-11-1-and-spectre-update/
- https://webkitgtk.org/security/WSA-2018-0001.html
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
- https://usn.ubuntu.com/usn/usn-3516-1
- https://usn.ubuntu.com/usn/usn-3530-1
- https://usn.ubuntu.com/usn/usn-3531-1
- https://usn.ubuntu.com/usn/usn-3531-2
- https://usn.ubuntu.com/usn/usn-3542-1
- https://usn.ubuntu.com/usn/usn-3542-2
- https://usn.ubuntu.com/usn/usn-3540-2
- https://usn.ubuntu.com/usn/usn-3540-1
- https://usn.ubuntu.com/usn/usn-3541-1
- https://usn.ubuntu.com/usn/usn-3541-2
- https://usn.ubuntu.com/usn/usn-3549-1
- https://usn.ubuntu.com/usn/usn-3560-1
- https://usn.ubuntu.com/usn/usn-3561-1
- https://usn.ubuntu.com/usn/usn-3580-1
- https://usn.ubuntu.com/usn/usn-3581-1
- https://usn.ubuntu.com/usn/usn-3581-2
- https://usn.ubuntu.com/usn/usn-3582-1
- https://usn.ubuntu.com/usn/usn-3582-2
- https://usn.ubuntu.com/usn/usn-3594-1
- https://usn.ubuntu.com/usn/usn-3597-1
- https://usn.ubuntu.com/usn/usn-3597-2
- https://usn.ubuntu.com/usn/usn-3531-3
- https://usn.ubuntu.com/usn/usn-3620-2
- https://usn.ubuntu.com/usn/usn-3690-1
- https://usn.ubuntu.com/usn/usn-3777-3
- NVD
- Launchpad
- Debian