Description
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Published: 2018-06-21
Score: 5.6 Medium
EPSS: 1.3% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1422-1 linux security update
Debian DLA Debian DLA DLA-1422-2 linux security update
Debian DSA Debian DSA DSA-4232-1 xen security update
EUVD EUVD EUVD-2018-15519 System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Ubuntu USN Ubuntu USN USN-3696-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3696-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3698-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3698-2 Linux kernel (Trusty HWE) vulnerabilities
References
Link Providers
http://www.openwall.com/lists/oss-security/2018/06/15/5 cve-icon
http://www.securityfocus.com/bid/104460 cve-icon cve-icon
http://www.securitytracker.com/id/1041124 cve-icon cve-icon
http://www.securitytracker.com/id/1041125 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1852 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1944 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2164 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2165 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1170 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1190 cve-icon cve-icon
https://access.redhat.com/solutions/3485131 cve-icon
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-3665 cve-icon
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 cve-icon cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20181016-0001/ cve-icon cve-icon
https://security.paloaltonetworks.com/CVE-2018-3665 cve-icon cve-icon
https://support.citrix.com/article/CTX235745 cve-icon cve-icon
https://usn.ubuntu.com/3696-1/ cve-icon cve-icon
https://usn.ubuntu.com/3696-2/ cve-icon cve-icon
https://usn.ubuntu.com/3698-1/ cve-icon cve-icon
https://usn.ubuntu.com/3698-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-3665 cve-icon
https://www.debian.org/security/2018/dsa-4232 cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.synology.com/support/security/Synology_SA_18_31 cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Citrix Xenserver
Debian Debian Linux
Freebsd Freebsd
Intel Core I3 Core I5 Core I7 Core M Core M3 Core M5 Core M7
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Workstation Enterprise Mrg Rhel Eus Rhel Extras Rt
cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2024-09-17T01:01:36.405Z

Reserved: 2017-12-28T00:00:00.000Z

Link: CVE-2018-3665

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-21T20:29:00.373

Modified: 2024-11-21T04:05:51.690

Link: CVE-2018-3665

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-06-13T21:00:00Z

Links: CVE-2018-3665 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses