System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
References
Link Providers
http://www.openwall.com/lists/oss-security/2018/06/15/5 cve-icon
http://www.securityfocus.com/bid/104460 cve-icon cve-icon
http://www.securitytracker.com/id/1041124 cve-icon cve-icon
http://www.securitytracker.com/id/1041125 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1852 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1944 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2164 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2165 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1170 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1190 cve-icon cve-icon
https://access.redhat.com/solutions/3485131 cve-icon
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-3665 cve-icon
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 cve-icon cve-icon
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20181016-0001/ cve-icon cve-icon
https://security.paloaltonetworks.com/CVE-2018-3665 cve-icon cve-icon
https://support.citrix.com/article/CTX235745 cve-icon cve-icon
https://usn.ubuntu.com/3696-1/ cve-icon cve-icon
https://usn.ubuntu.com/3696-2/ cve-icon cve-icon
https://usn.ubuntu.com/3698-1/ cve-icon cve-icon
https://usn.ubuntu.com/3698-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-3665 cve-icon
https://www.debian.org/security/2018/dsa-4232 cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html cve-icon cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.synology.com/support/security/Synology_SA_18_31 cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published: 2018-06-21T20:00:00Z

Updated: 2024-09-17T01:01:36.405Z

Reserved: 2017-12-28T00:00:00

Link: CVE-2018-3665

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-21T20:29:00.373

Modified: 2024-11-21T04:05:51.690

Link: CVE-2018-3665

cve-icon Redhat

Severity : Moderate

Publid Date: 2018-06-13T21:00:00Z

Links: CVE-2018-3665 - Bugzilla