Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1423-1 | linux-4.9 new package |
![]() |
DLA-1446-1 | intel-microcode security update |
![]() |
DLA-1506-1 | intel-microcode security update |
![]() |
DLA-1715-1 | linux-4.9 security update |
![]() |
DLA-1731-1 | linux security update |
![]() |
DLA-1731-2 | linux regression update |
![]() |
DLA-2323-1 | linux-4.19 new package |
![]() |
DSA-4210-1 | xen security update |
![]() |
DSA-4273-1 | intel-microcode security update |
![]() |
DSA-4273-2 | intel-microcode security update |
![]() |
DSA-4469-1 | libvirt security update |
![]() |
USN-3651-1 | QEMU update |
![]() |
USN-3652-1 | Linux kernel vulnerability |
![]() |
USN-3653-1 | Linux kernel vulnerabilities |
![]() |
USN-3653-2 | Linux kernel (HWE) vulnerabilities |
![]() |
USN-3654-1 | Linux kernel vulnerabilities |
![]() |
USN-3654-2 | Linux kernel (Xenial HWE) vulnerabilities |
![]() |
USN-3655-1 | Linux kernel vulnerabilities |
![]() |
USN-3655-2 | Linux kernel (Trusty HWE) vulnerabilities |
![]() |
USN-3679-1 | QEMU update |
![]() |
USN-3680-1 | libvirt vulnerability and update |
![]() |
USN-3756-1 | Intel Microcode vulnerabilities |
![]() |
USN-3777-3 | Linux kernel (Azure) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-09-16T22:55:27.557Z
Reserved: 2017-12-28T00:00:00
Link: CVE-2018-3639

No data.

Status : Modified
Published: 2018-05-22T12:29:00.250
Modified: 2024-11-21T04:05:48.867
Link: CVE-2018-3639


No data.