vulnerability
Ubuntu: (Multiple Advisories) (CVE-2018-3639): QEMU update
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | May 21, 2018 | May 23, 2018 | Aug 18, 2025 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
May 21, 2018
Added
May 23, 2018
Modified
Aug 18, 2025
Description
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Solutions
ubuntu-upgrade-intel-microcodeubuntu-upgrade-libvirt-binubuntu-upgrade-libvirt0ubuntu-upgrade-linux-image-3-13-0-149-genericubuntu-upgrade-linux-image-3-13-0-149-generic-lpaeubuntu-upgrade-linux-image-3-13-0-149-lowlatencyubuntu-upgrade-linux-image-3-13-0-149-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-149-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-149-powerpc-smpubuntu-upgrade-linux-image-3-13-0-149-powerpc64-embubuntu-upgrade-linux-image-3-13-0-149-powerpc64-smpubuntu-upgrade-linux-image-4-13-0-1017-gcpubuntu-upgrade-linux-image-4-13-0-1018-azureubuntu-upgrade-linux-image-4-13-0-1028-oemubuntu-upgrade-linux-image-4-13-0-43-genericubuntu-upgrade-linux-image-4-13-0-43-generic-lpaeubuntu-upgrade-linux-image-4-13-0-43-lowlatencyubuntu-upgrade-linux-image-4-15-0-1008-gcpubuntu-upgrade-linux-image-4-15-0-1009-awsubuntu-upgrade-linux-image-4-15-0-1010-kvmubuntu-upgrade-linux-image-4-15-0-1025-azureubuntu-upgrade-linux-image-4-15-0-22-genericubuntu-upgrade-linux-image-4-15-0-22-generic-lpaeubuntu-upgrade-linux-image-4-15-0-22-lowlatencyubuntu-upgrade-linux-image-4-4-0-1022-awsubuntu-upgrade-linux-image-4-4-0-1026-kvmubuntu-upgrade-linux-image-4-4-0-1060-awsubuntu-upgrade-linux-image-4-4-0-127-genericubuntu-upgrade-linux-image-4-4-0-127-generic-lpaeubuntu-upgrade-linux-image-4-4-0-127-lowlatencyubuntu-upgrade-linux-image-4-4-0-127-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-127-powerpc-smpubuntu-upgrade-linux-image-4-4-0-127-powerpc64-embubuntu-upgrade-linux-image-4-4-0-127-powerpc64-smpubuntu-upgrade-linux-image-awsubuntu-upgrade-linux-image-azureubuntu-upgrade-linux-image-azure-edgeubuntu-upgrade-linux-image-gcpubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-hwe-16-04ubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-hwe-16-04ubuntu-upgrade-linux-image-generic-lpae-lts-trustyubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-trustyubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-gkeubuntu-upgrade-linux-image-kvmubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-hwe-16-04ubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-oemubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-qemuubuntu-upgrade-qemu-systemubuntu-upgrade-qemu-system-x86
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.