System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
History
21 Nov 2024, 04:05
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/104460Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041124Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1041125Â - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2018:1852Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:1944Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2164Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:2165Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1170Â - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:1190Â - Third Party Advisory | |
References | () https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0Â - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Third Party Advisory | |
References | () https://nvidia.custhelp.com/app/answers/detail/a_id/4787Â - Third Party Advisory | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20181016-0001/Â - Third Party Advisory | |
References | () https://security.paloaltonetworks.com/CVE-2018-3665Â - Third Party Advisory | |
References | () https://support.citrix.com/article/CTX235745Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3696-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3696-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3698-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3698-2/Â - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4232Â - Third Party Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html - Vendor Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory | |
References | () https://www.synology.com/support/security/Synology_SA_18_31Â - Third Party Advisory |
09 Jun 2021, 16:24
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:citrix:xenserver:7.4:*:*:*:*:*:*:* cpe:2.3:o:citrix:xenserver:7.3:*:*:*:*:*:*:* cpe:2.3:o:citrix:xenserver:7.5:*:*:*:*:*:*:* cpe:2.3:o:citrix:xenserver:7.1:*:*:*:*:*:*:* |
cpe:2.3:a:citrix:xenserver:7.0:*:*:*:*:*:*:* cpe:2.3:a:citrix:xenserver:7.5:*:*:*:*:*:*:* cpe:2.3:a:citrix:xenserver:7.1:*:*:*:*:*:*:* cpe:2.3:a:citrix:xenserver:7.4:*:*:*:*:*:*:* cpe:2.3:a:citrix:xenserver:7.3:*:*:*:*:*:*:* |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1190Â - Third Party Advisory | |
References | (CONFIRM) https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0Â - Third Party Advisory | |
References | (CONFIRM) https://nvidia.custhelp.com/app/answers/detail/a_id/4787Â - Third Party Advisory | |
References | (CONFIRM) https://security.paloaltonetworks.com/CVE-2018-3665Â - Third Party Advisory | |
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20181016-0001/Â - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:1170Â - Third Party Advisory | |
References | (MISC) https://www.oracle.com/security-alerts/cpujul2020.html - Third Party Advisory |
Information
Published : 2018-06-21 20:29
Updated : 2024-11-21 04:05
NVD link : CVE-2018-3665
Mitre link : CVE-2018-3665
CVE.ORG link : CVE-2018-3665
JSON object : View
Products Affected
intel
- core_m
- core_i3
- core_i7
- core_m3
- core_i5
- core_m5
- core_m7
canonical
- ubuntu_linux
citrix
- xenserver
debian
- debian_linux
freebsd
- freebsd
redhat
- enterprise_linux_workstation
- enterprise_linux
- enterprise_linux_desktop
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor