{"id":"CVE-2018-3665","details":"System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.","modified":"2026-03-12T22:52:21.142193Z","published":"2018-06-21T20:29:00.373Z","related":["SUSE-SU-2018:1761-1","SUSE-SU-2018:1762-1","SUSE-SU-2018:1772-1","SUSE-SU-2018:1816-1","SUSE-SU-2018:1821-1","SUSE-SU-2018:1846-1","SUSE-SU-2018:1849-1","SUSE-SU-2018:1855-1","SUSE-SU-2018:1855-2","SUSE-SU-2018:1940-1","SUSE-SU-2018:1942-1","SUSE-SU-2018:1943-1","SUSE-SU-2018:1944-1","SUSE-SU-2018:1945-1","SUSE-SU-2018:1946-1","SUSE-SU-2018:1947-1","SUSE-SU-2018:1948-1","SUSE-SU-2018:1949-1","SUSE-SU-2018:1981-1","SUSE-SU-2018:2037-1","SUSE-SU-2018:2048-1","SUSE-SU-2018:2056-1","SUSE-SU-2018:2059-1","SUSE-SU-2018:2069-1","SUSE-SU-2018:2081-1","SUSE-SU-2018:2081-2","SUSE-SU-2018:2086-1","SUSE-SU-2018:2087-1","SUSE-SU-2018:2088-1","SUSE-SU-2018:2090-1","SUSE-SU-2018:2091-1","SUSE-SU-2018:2093-1","SUSE-SU-2018:2094-1","SUSE-SU-2018:2095-1","SUSE-SU-2018:2096-1","SUSE-SU-2018:2097-1","SUSE-SU-2018:2098-1","SUSE-SU-2018:2099-1","SUSE-SU-2018:2100-1","SUSE-SU-2018:2101-1","SUSE-SU-2018:2102-1","SUSE-SU-2018:2103-1","SUSE-SU-2018:2104-1","SUSE-SU-2018:2105-1","SUSE-SU-2018:2106-1","SUSE-SU-2018:2107-1","SUSE-SU-2018:2108-1","SUSE-SU-2018:2109-1","SUSE-SU-2018:2110-1","SUSE-SU-2018:2111-1","SUSE-SU-2018:2112-1","SUSE-SU-2018:2113-1","SUSE-SU-2018:2114-1","SUSE-SU-2018:2115-1","SUSE-SU-2018:2248-1","SUSE-SU-2018:2250-1","SUSE-SU-2018:2254-1","SUSE-SU-2018:2255-1","SUSE-SU-2018:2262-1","SUSE-SU-2018:2263-1","SUSE-SU-2018:2264-1","SUSE-SU-2018:2266-1","SUSE-SU-2018:2267-1","SUSE-SU-2018:2268-1","SUSE-SU-2018:2269-1","SUSE-SU-2018:2270-1","SUSE-SU-2018:2271-1","SUSE-SU-2018:2528-1","openSUSE-SU-2024:11520-1"],"references":[{"type":"ADVISORY","url":"https://usn.ubuntu.com/3698-1/"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041125"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1170"},{"type":"ADVISORY","url":"https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20181016-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3696-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4232"},{"type":"ADVISORY","url":"https://www.oracle.com/security-alerts/cpujul2020.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/104460"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1852"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2165"},{"type":"ADVISORY","url":"https://support.citrix.com/article/CTX235745"},{"type":"ADVISORY","url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html"},{"type":"ADVISORY","url":"https://www.synology.com/support/security/Synology_SA_18_31"},{"type":"ADVISORY","url":"http://www.securitytracker.com/id/1041124"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:1944"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2018:2164"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:1190"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3696-2/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3698-2/"},{"type":"ADVISORY","url":"https://nvidia.custhelp.com/app/answers/detail/a_id/4787"},{"type":"ADVISORY","url":"https://security.FreeBSD.org/advisories/FreeBSD-SA-18:07.lazyfpu.asc"},{"type":"ADVISORY","url":"https://security.paloaltonetworks.com/CVE-2018-3665"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"7.3"}]},{"events":[{"introduced":"0"},{"last_affected":"7.4"}]},{"events":[{"introduced":"0"},{"last_affected":"7.5"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.0"}]},{"events":[{"introduced":"0"},{"last_affected":"11.1"}]},{"events":[{"introduced":"0"},{"last_affected":"11.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-3665.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N"}]}