vulnerability
SUSE: CVE-2018-3639: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
2 | (AV:L/AC:L/Au:N/C:P/I:N/A:N) | May 21, 2018 | May 22, 2018 | Feb 4, 2022 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
May 21, 2018
Added
May 22, 2018
Modified
Feb 4, 2022
Description
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Solution(s)
suse-upgrade-java-1_8_0-openjdksuse-upgrade-java-1_8_0-openjdk-demosuse-upgrade-java-1_8_0-openjdk-develsuse-upgrade-java-1_8_0-openjdk-headlesssuse-upgrade-kernel-azure-basesuse-upgrade-kernel-defaultsuse-upgrade-kernel-default-extrasuse-upgrade-kernel-default-mansuse-upgrade-kernel-devel-azuresuse-upgrade-kernel-docssuse-upgrade-kernel-obs-buildsuse-upgrade-kernel-source-azuresuse-upgrade-libvirtsuse-upgrade-libvirt-adminsuse-upgrade-libvirt-bash-completionsuse-upgrade-libvirt-clientsuse-upgrade-libvirt-daemonsuse-upgrade-libvirt-daemon-config-networksuse-upgrade-libvirt-daemon-config-nwfiltersuse-upgrade-libvirt-daemon-driver-interfacesuse-upgrade-libvirt-daemon-driver-libxlsuse-upgrade-libvirt-daemon-driver-lxcsuse-upgrade-libvirt-daemon-driver-networksuse-upgrade-libvirt-daemon-driver-nodedevsuse-upgrade-libvirt-daemon-driver-nwfiltersuse-upgrade-libvirt-daemon-driver-qemususe-upgrade-libvirt-daemon-driver-secretsuse-upgrade-libvirt-daemon-driver-storagesuse-upgrade-libvirt-daemon-driver-storage-coresuse-upgrade-libvirt-daemon-driver-storage-disksuse-upgrade-libvirt-daemon-driver-storage-iscsisuse-upgrade-libvirt-daemon-driver-storage-iscsi-directsuse-upgrade-libvirt-daemon-driver-storage-logicalsuse-upgrade-libvirt-daemon-driver-storage-mpathsuse-upgrade-libvirt-daemon-driver-storage-rbdsuse-upgrade-libvirt-daemon-driver-storage-scsisuse-upgrade-libvirt-daemon-hookssuse-upgrade-libvirt-daemon-lxcsuse-upgrade-libvirt-daemon-qemususe-upgrade-libvirt-daemon-xensuse-upgrade-libvirt-develsuse-upgrade-libvirt-devel-32bitsuse-upgrade-libvirt-docsuse-upgrade-libvirt-libssuse-upgrade-libvirt-lock-sanlocksuse-upgrade-libvirt-nsssuse-upgrade-qemususe-upgrade-qemu-armsuse-upgrade-qemu-audio-alsasuse-upgrade-qemu-audio-osssuse-upgrade-qemu-audio-pasuse-upgrade-qemu-audio-spicesuse-upgrade-qemu-block-curlsuse-upgrade-qemu-block-iscsisuse-upgrade-qemu-block-rbdsuse-upgrade-qemu-block-sshsuse-upgrade-qemu-chardev-baumsuse-upgrade-qemu-chardev-spicesuse-upgrade-qemu-guest-agentsuse-upgrade-qemu-hw-display-qxlsuse-upgrade-qemu-hw-display-virtio-gpususe-upgrade-qemu-hw-display-virtio-gpu-pcisuse-upgrade-qemu-hw-display-virtio-vgasuse-upgrade-qemu-hw-s390x-virtio-gpu-ccwsuse-upgrade-qemu-hw-usb-redirectsuse-upgrade-qemu-ipxesuse-upgrade-qemu-ksmsuse-upgrade-qemu-kvmsuse-upgrade-qemu-langsuse-upgrade-qemu-microvmsuse-upgrade-qemu-ppcsuse-upgrade-qemu-s390suse-upgrade-qemu-s390xsuse-upgrade-qemu-seabiossuse-upgrade-qemu-sgabiossuse-upgrade-qemu-skibootsuse-upgrade-qemu-toolssuse-upgrade-qemu-ui-cursessuse-upgrade-qemu-ui-gtksuse-upgrade-qemu-ui-openglsuse-upgrade-qemu-ui-spice-appsuse-upgrade-qemu-ui-spice-coresuse-upgrade-qemu-vgabiossuse-upgrade-qemu-x86suse-upgrade-ucode-intelsuse-upgrade-xensuse-upgrade-xen-develsuse-upgrade-xen-libssuse-upgrade-xen-toolssuse-upgrade-xen-tools-domususe-upgrade-xen-tools-xendomains-wait-disk
References
- SUSE-SUSE-SU-2018:1362-1
- SUSE-SUSE-SU-2018:1362-2
- SUSE-SUSE-SU-2018:1363-1
- SUSE-SUSE-SU-2018:1366-1
- SUSE-SUSE-SU-2018:1368-1
- SUSE-SUSE-SU-2018:1374-1
- SUSE-SUSE-SU-2018:1375-1
- SUSE-SUSE-SU-2018:1376-1
- SUSE-SUSE-SU-2018:1377-1
- SUSE-SUSE-SU-2018:1377-2
- SUSE-SUSE-SU-2018:1378-1
- SUSE-SUSE-SU-2018:1386-1
- SUSE-SUSE-SU-2018:1389-1
- SUSE-SUSE-SU-2018:1452-1
- SUSE-SUSE-SU-2018:1456-1
- SUSE-SUSE-SU-2018:1475-1
- SUSE-SUSE-SU-2018:1479-1
- SUSE-SUSE-SU-2018:1582-1
- SUSE-SUSE-SU-2018:1603-1
- SUSE-SUSE-SU-2018:1614-1
- SUSE-SUSE-SU-2018:1614-2
- SUSE-SUSE-SU-2018:1658-1
- SUSE-SUSE-SU-2018:1699-1
- SUSE-SUSE-SU-2018:1699-2
- SUSE-SUSE-SU-2018:1816-1
- SUSE-SUSE-SU-2018:1846-1
- SUSE-SUSE-SU-2018:1926-1
- SUSE-SUSE-SU-2018:1935-1
- SUSE-SUSE-SU-2018:1935-2
- SUSE-SUSE-SU-2018:2076-1
- SUSE-SUSE-SU-2018:2082-1
- SUSE-SUSE-SU-2018:2092-1
- SUSE-SUSE-SU-2018:2141-1
- SUSE-SUSE-SU-2018:2304-1
- SUSE-SUSE-SU-2018:2331-1
- SUSE-SUSE-SU-2018:2331-2
- SUSE-SUSE-SU-2018:2335-1
- SUSE-SUSE-SU-2018:2338-1
- SUSE-SUSE-SU-2018:2340-1
- SUSE-SUSE-SU-2018:2528-1
- SUSE-SUSE-SU-2018:2556-1
- SUSE-SUSE-SU-2018:2565-1
- SUSE-SUSE-SU-2018:2615-1
- SUSE-SUSE-SU-2018:2650-1
- SUSE-SUSE-SU-2018:2973-1
- SUSE-SUSE-SU-2018:2973-2
- SUSE-SUSE-SU-2018:3064-1
- SUSE-SUSE-SU-2018:3064-2
- SUSE-SUSE-SU-2018:3064-3
- SUSE-SUSE-SU-2018:3555-1
- SUSE-SUSE-SU-2019:0049-1
- SUSE-SUSE-SU-2019:0049-2
- SUSE-SUSE-SU-2019:0148-1
- SUSE-SUSE-SU-2019:1211-1
- SUSE-SUSE-SU-2019:1211-2
- SUSE-SUSE-SU-2019:1219-1
- SUSE-SUSE-SU-2019:2028-1
- SUSE-SUSE-SU-2020:2540-1
- SUSE-SUSE-SU-2020:2605-1
- SUSE-SUSE-SU-2021:3007-1
- SUSE-SUSE-SU-2021:3969-1
- UBUNTU-USN-3651-1
- UBUNTU-USN-3652-1
- UBUNTU-USN-3653-1
- UBUNTU-USN-3653-2
- UBUNTU-USN-3654-1
- UBUNTU-USN-3654-2
- UBUNTU-USN-3655-1
- UBUNTU-USN-3655-2
- UBUNTU-USN-3679-1
- UBUNTU-USN-3680-1
- UBUNTU-USN-3756-1
- UBUNTU-USN-3777-1
- UBUNTU-USN-3777-2
- UBUNTU-USN-3777-3
- DEBIAN-DSA-4210
- DEBIAN-DSA-4273
- NVD-CVE-2018-3639

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.