CVE-2018-15572
Publication date 19 August 2018
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The spectre_v2_select_mitigation function in arch/x86/kernel/cpu/bugs.c in the Linux kernel before 4.18.1 does not always fill RSB upon a context switch, which makes it easier for attackers to conduct userspace-userspace spectreRSB attacks.
From the Ubuntu Security Team
It was discovered that microprocessors utilizing speculative execution and prediction of return addresses via Return Stack Buffer (RSB) may allow unauthorized memory reads via sidechannel attacks. An attacker could use this to expose sensitive information.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| linux-aws | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1023.23
|
|
| linux-aws-hwe | ||
| 18.04 LTS bionic | Not in release | |
| linux-azure | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1025.26
|
|
| linux-oracle | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux | ||
| 18.04 LTS bionic |
Fixed 4.15.0-36.39
|
|
| linux-azure-edge | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1025.26
|
|
| linux-euclid | ||
| 18.04 LTS bionic | Not in release | |
| linux-flo | ||
| 18.04 LTS bionic | Not in release | |
| linux-gcp | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1021.22
|
|
| linux-gcp-edge | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-gke | ||
| 18.04 LTS bionic | Not in release | |
| linux-goldfish | ||
| 18.04 LTS bionic | Not in release | |
| linux-grouper | ||
| 18.04 LTS bionic | Not in release | |
| linux-hwe | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-hwe-edge | ||
| 18.04 LTS bionic |
Not affected
|
|
| linux-kvm | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1023.23
|
|
| linux-lts-trusty | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-utopic | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-vivid | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-wily | ||
| 18.04 LTS bionic | Not in release | |
| linux-lts-xenial | ||
| 18.04 LTS bionic | Not in release | |
| linux-maguro | ||
| 18.04 LTS bionic | Not in release | |
| linux-mako | ||
| 18.04 LTS bionic | Not in release | |
| linux-manta | ||
| 18.04 LTS bionic | Not in release | |
| linux-oem | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1021.24
|
|
| linux-raspi2 | ||
| 18.04 LTS bionic |
Fixed 4.15.0-1024.26
|
|
| linux-snapdragon | ||
| 18.04 LTS bionic |
Not affected
|
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Changed |
| Confidentiality | High |
| Integrity impact | None |
| Availability impact | None |
| Vector | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-3776-1
- Linux kernel vulnerabilities
- 1 October 2018
- USN-3776-2
- Linux kernel (Xenial HWE) vulnerabilities
- 1 October 2018
- USN-3777-2
- Linux kernel (HWE) vulnerabilities
- 1 October 2018
- USN-3777-1
- Linux kernel vulnerabilities
- 1 October 2018
- USN-3777-3
- Linux kernel (Azure) vulnerabilities
- 23 October 2018
- USN-3775-2
- Linux kernel (Trusty HWE) vulnerabilities
- 1 October 2018
- USN-3775-1
- Linux kernel vulnerabilities
- 1 October 2018
Other references
- https://git.kernel.org/linus/fdf82a7856b32d905c39afc85e34364491e46346
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=fdf82a7856b32d905c39afc85e34364491e46346
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1
- https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346
- https://www.cve.org/CVERecord?id=CVE-2018-15572