CVE-2018-3620

CVE Details

Release Date:2018-08-14

Description


Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

See more information about CVE-2018-3620 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.6 Base Metrics: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Access Vector: Local network Attack Complexity: High
Privileges Required: Low User Interaction: None
Scope: Changed Confidentiality Impact: High
Integrity Impact: None Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel)ELSA-2018-42352018-10-01
Oracle Linux version 5 (kernel-uek)ELSA-2018-42142018-09-13
Oracle Linux version 5 (ocfs2-2.6.18-419.0.0.0.12.el5)ELSA-2018-42352018-10-01
Oracle Linux version 5 (oracleasm-2.6.18-419.0.0.0.12.el5)ELSA-2018-42352018-10-01
Oracle Linux version 6 (dtrace-modules-3.8.13-118.24.2.el6uek)ELSA-2018-42152018-09-13
Oracle Linux version 6 (kernel)ELSA-2018-23902018-08-14
Oracle Linux version 6 (kernel-uek)ELSA-2018-41962018-08-14
Oracle Linux version 6 (kernel-uek)ELSA-2018-42142018-09-13
Oracle Linux version 6 (kernel-uek)ELSA-2018-42152018-09-13
Oracle Linux version 7 (dtrace-modules-3.8.13-118.24.2.el7uek)ELSA-2018-42152018-09-13
Oracle Linux version 7 (kernel)ELSA-2018-23842018-08-14
Oracle Linux version 7 (kernel-uek)ELSA-2018-41952018-08-14
Oracle Linux version 7 (kernel-uek)ELSA-2018-41962018-08-14
Oracle Linux version 7 (kernel-uek)ELSA-2018-42152018-09-13
Oracle VM version 3.2 (xen)OVMSA-2018-02722018-11-13
Oracle VM version 3.3 (xen)OVMSA-2018-02712018-11-13
Oracle VM version 3.4 (kernel-uek)OVMSA-2018-02472018-08-14
Oracle VM version 3.4 (xen)OVMSA-2020-00072020-03-09



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete