CVE-2018-3615

Name
CVE-2018-3615
Description
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Vendor Advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
Third Party Advisory https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
Third Party Advisory http://www.securitytracker.com/id/1041451
Third Party Advisory http://www.securityfocus.com/bid/105080
Third Party Advisory https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
Mitigation https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
Technical Description https://foreshadowattack.eu/
Third Party Advisory http://support.lenovo.com/us/en/solutions/LEN-24163
Third Party Advisory https://www.synology.com/support/security/Synology_SA_18_45
Third Party Advisory https://security.netapp.com/advisory/ntap-20180815-0001/
Third Party Advisory https://support.f5.com/csp/article/K35558453
Third Party Advisory https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0008
Third Party Advisory http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
Third Party Advisory https://www.kb.cert.org/vuls/id/982149
MLIST https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
CONFIRM https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
CONFIRM https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Match rules

CPE URI Source package Min version Max version
cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:* core_i3 == None == 6006u
cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:* core_i3 == None == 6098p
cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:* core_i3 == None == 6102e
cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:* core_i3 == None == 6157u
cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:* core_i5 == None == 661
cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:* core_i5 == None == 670
cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:* core_i5 == None == 6300u
cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:* core_i5 == None == 6350hq
cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:* core_i5 == None == 6442eq
cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:* core_i5 == None == 6500
cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:* core_i5 == None == 6500t
cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:* core_i7 == None == 610e
cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:* core_i7 == None == 620le
cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:* core_i7 == None == 640um
cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:* core_i7 == None == 660lm
cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:* core_i3 == None == 6100h
cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:* core_i3 == None == 6100t
cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:* core_i3 == None == 6320
cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:* core_i5 == None == 650
cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:* core_i3 == None == 6100te
cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:* core_i3 == None == 6100u
cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:* core_i5 == None == 655k
cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:* core_i5 == None == 660
cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:* core_i5 == None == 6287u
cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:* core_i5 == None == 6300hq
cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:* core_i5 == None == 6440eq
cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:* core_i5 == None == 6440hq
cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:* core_i5 == None == 6600t
cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:* core_i5 == None == 6685r
cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:* core_i7 == None == 640lm
cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:* core_i7 == None == 640m
cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:* core_i5 == None == 6260u
cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:* core_i5 == None == 6267u
cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:* core_i5 == None == 6400t
cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:* core_i5 == None == 6402p
cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:* core_i5 == None == 6600
cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:* core_i5 == None == 6600k
cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:* core_i7 == None == 620ue
cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:* core_i7 == None == 620um
cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:* core_i7 == None == 680um
cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:* core_i3 == None == 6100
cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:* core_i3 == None == 6100e
cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:* core_i3 == None == 6167u
cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:* core_i3 == None == 6300
cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:* core_i3 == None == 6300t
cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:* core_i5 == None == 680
cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:* core_i5 == None == 6200u
cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:* core_i5 == None == 6360u
cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:* core_i5 == None == 6400
cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:* core_i5 == None == 6500te
cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:* core_i5 == None == 6585r
cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:* core_i7 == None == 620lm
cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:* core_i7 == None == 620m
cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:* core_i7 == None == 660ue
cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:* core_i7 == None == 660um

Vulnerable and fixed packages

Source package Branch Version Maintainer Status