~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2018-3640

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2018-3640
2
 
CRD: 2018-05-21 21:00:00 UTC
3
 
PublicDate: 2018-05-22
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3640
6
 
 https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
7
 
Description:
8
 
 Systems with microprocessors utilizing speculative execution and that
9
 
 perform speculative reads of system registers may allow unauthorized
10
 
 disclosure of system parameters to an attacker with local user access via a
11
 
 side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
12
 
Ubuntu-Description:
13
 
Notes:
14
 
 tyhicks> V3a - Rogue Register Load
15
 
 tyhicks> Will be entirely addressed by microcode updates. No kernel changes
16
 
  are needed.
17
 
Bugs:
18
 
Priority: medium
19
 
Discovered-by: Zdenek Sojka, Rudolf Marek, Alex Zuepke, and Innokentiy Sennovskiy
20
 
Assigned-to: 
21
 
 
22
 
Patches_intel-microcode:
23
 
upstream_intel-microcode: needed
24
 
precise/esm_intel-microcode: DNE
25
 
trusty_intel-microcode: needed
26
 
xenial_intel-microcode: needed
27
 
artful_intel-microcode: needed
28
 
bionic_intel-microcode: needed
29
 
devel_intel-microcode: needed