1
Candidate: CVE-2018-3640
2
CRD: 2018-05-21 21:00:00 UTC
5
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
6
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
8
Systems with microprocessors utilizing speculative execution and that
9
perform speculative reads of system registers may allow unauthorized
10
disclosure of system parameters to an attacker with local user access via a
11
side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
14
tyhicks> V3a - Rogue Register Load
15
tyhicks> Will be entirely addressed by microcode updates. No kernel changes
19
Discovered-by: Zdenek Sojka, Rudolf Marek, Alex Zuepke, and Innokentiy Sennovskiy
22
Patches_intel-microcode:
23
upstream_intel-microcode: needed
24
precise/esm_intel-microcode: DNE
25
trusty_intel-microcode: needed
26
xenial_intel-microcode: needed
27
artful_intel-microcode: needed
28
bionic_intel-microcode: needed
29
devel_intel-microcode: needed