CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
32.0%
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | core_i3 | 330e | cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:* |
intel | core_i3 | 330m | cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:* |
intel | core_i3 | 330um | cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:* |
intel | core_i3 | 350m | cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:* |
intel | core_i3 | 370m | cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:* |
intel | core_i3 | 380m | cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:* |
intel | core_i3 | 380um | cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:* |
intel | core_i3 | 390m | cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:* |
intel | core_i3 | 530 | cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:* |
intel | core_i3 | 540 | cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:* |
www.securityfocus.com/bid/104460
www.securitytracker.com/id/1041124
www.securitytracker.com/id/1041125
access.redhat.com/errata/RHSA-2018:1852
access.redhat.com/errata/RHSA-2018:1944
access.redhat.com/errata/RHSA-2018:2164
access.redhat.com/errata/RHSA-2018:2165
access.redhat.com/errata/RHSA-2019:1170
access.redhat.com/errata/RHSA-2019:1190
help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
lists.debian.org/debian-lts-announce/2018/07/msg00015.html
lists.debian.org/debian-lts-announce/2018/07/msg00016.html
nvidia.custhelp.com/app/answers/detail/a_id/4787
security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc
security.netapp.com/advisory/ntap-20181016-0001/
security.paloaltonetworks.com/CVE-2018-3665
support.citrix.com/article/CTX235745
usn.ubuntu.com/3696-1/
usn.ubuntu.com/3696-2/
usn.ubuntu.com/3698-1/
usn.ubuntu.com/3698-2/
www.debian.org/security/2018/dsa-4232
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
www.oracle.com/security-alerts/cpujul2020.html
www.synology.com/support/security/Synology_SA_18_31
CVSS2
Attack Vector
LOCAL
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
32.0%