Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-3640

Опубликовано: 22 мая 2018
Источник: debian
EPSS Низкий

Описание

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
intel-microcodefixed3.20180703.1package

Примечания

  • https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability

  • No software mitigations planned to be implemented in src:linux

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html

  • The 3.20180703.1 release for intel-microcode was the first batch of updates which targeted

  • most server type CPUs, additional models were supported in the 3.20180807a.1 release

EPSS

Процентиль: 75%
0.00895
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

CVSS3: 2.8
redhat
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

CVSS3: 5.6
nvd
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

CVSS3: 5.6
github
больше 3 лет назад

Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.

CVSS3: 4.3
fstec
больше 7 лет назад

Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного считывания системных регистров, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 75%
0.00895
Низкий