Описание
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 3.20180807a.0ubuntu0.18.04.1 |
| devel | not-affected | 3.20180807a.1 |
| esm-infra-legacy/trusty | released | 3.20180807a.0ubuntu0.14.04.1 |
| esm-infra/bionic | released | 3.20180807a.0ubuntu0.18.04.1 |
| esm-infra/xenial | released | 3.20180807a.0ubuntu0.16.04.1 |
| precise/esm | DNE | |
| trusty | released | 3.20180807a.0ubuntu0.14.04.1 |
| trusty/esm | released | 3.20180807a.0ubuntu0.14.04.1 |
| upstream | needed |
Показывать по
EPSS
4.7 Medium
CVSS2
5.6 Medium
CVSS3
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Systems with microprocessors utilizing speculative execution and that ...
Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного считывания системных регистров, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
4.7 Medium
CVSS2
5.6 Medium
CVSS3