CVE-2018-3615
14.08.2018, 19:29
Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.Enginsight
Vendor | Product | Version |
---|---|---|
intel | xeon_e3_1220_v5 | - |
intel | xeon_e3_1225_v5 | - |
intel | xeon_e3_1230_v5 | - |
intel | xeon_e3_1235l_v5 | - |
intel | xeon_e3_1240_v5 | - |
intel | xeon_e3_1240l_v5 | - |
intel | xeon_e3_1245_v5 | - |
intel | xeon_e3_1260l_v5 | - |
intel | xeon_e3_1268l_v5 | - |
intel | xeon_e3_1270_v5 | - |
intel | xeon_e3_1275_v5 | - |
intel | xeon_e3_1280_v5 | - |
intel | xeon_e3_1505l_v5 | - |
intel | xeon_e3_1505m_v5 | - |
intel | xeon_e3_1220_v6 | - |
intel | xeon_e3_1225_v6 | - |
intel | xeon_e3_1230_v6 | - |
intel | xeon_e3_1240_v6 | - |
intel | xeon_e3_1245_v6 | - |
intel | xeon_e3_1270_v6 | - |
intel | xeon_e3_1275_v6 | - |
intel | xeon_e3_1280_v6 | - |
intel | xeon_e3_1285_v6 | - |
intel | xeon_e3_1501l_v6 | - |
intel | xeon_e3_1501m_v6 | - |
intel | xeon_e3_1505l_v6 | - |
𝑥
= Vulnerable software versions

Debian Releases
Debian Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
intel-microcode |
|

Ubuntu Releases
Ubuntu Product | |||||||
---|---|---|---|---|---|---|---|
linux |
| ||||||
linux-aws |
| ||||||
linux-azure |
| ||||||
linux-azure-edge |
| ||||||
linux-euclid |
| ||||||
linux-flo |
| ||||||
linux-gcp |
| ||||||
linux-gke |
| ||||||
linux-goldfish |
| ||||||
linux-grouper |
| ||||||
linux-hwe |
| ||||||
linux-hwe-edge |
| ||||||
linux-kvm |
| ||||||
linux-lts-trusty |
| ||||||
linux-lts-utopic |
| ||||||
linux-lts-vivid |
| ||||||
linux-lts-wily |
| ||||||
linux-lts-xenial |
| ||||||
linux-maguro |
| ||||||
linux-mako |
| ||||||
linux-manta |
| ||||||
linux-oem |
| ||||||
linux-raspi2 |
| ||||||
linux-snapdragon |
|
References