CVE-2018-3640 (retired)

Priority
Description
Systems with microprocessors utilizing speculative execution and that
perform speculative reads of system registers may allow unauthorized
disclosure of system parameters to an attacker with local user access via a
side-channel analysis, aka Rogue System Register Read (RSRE), Variant 3a.
Notes
 tyhicks> V3a - Rogue Register Load
 tyhicks> Will be entirely addressed by microcode updates. No kernel changes
  are needed.
Package
Upstream:needed
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (3.20180807a.0ubuntu0.14.04.1)
Ubuntu 16.04 LTS (Xenial Xerus):released (3.20180807a.0ubuntu0.16.04.1)
Ubuntu 18.04 LTS (Bionic Beaver):released (3.20180807a.0ubuntu0.18.04.1)
Ubuntu 18.10 (Cosmic Cuttlefish):not-affected (3.20180807a.1)
More Information

Updated: 2019-03-26 12:27:25 UTC (commit ccdecfcf0fead22bd291e5f4ea745a46872dcb15)