<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2018-3615</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2018-3615</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>3</Number>
        <Date>2021-06-09T13:11:30Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T14:08:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-06-09T13:11:30Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2018-3615</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/c/suse-addresses-the-l1-terminal-fault-issue/</URL>
      <Description>E-Mail link for L1TF-BLOG-SUSE</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=000019216</URL>
      <Description>E-Mail link for TID000019216</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=000019230</URL>
      <Description>E-Mail link for TID000019230</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=000019335</URL>
      <Description>E-Mail link for TID000019335</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=000019439</URL>
      <Description>E-Mail link for TID000019439</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=7023077</URL>
      <Description>E-Mail link for TID7023077</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=7023078</URL>
      <Description>E-Mail link for TID7023078</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=7023312</URL>
      <Description>E-Mail link for TID7023312</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=7023497</URL>
      <Description>E-Mail link for TID7023497</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/kb/doc/?id=7023836</URL>
      <Description>E-Mail link for TID7023836</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod"/>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.</Note>
    </Notes>
    <CVE>CVE-2018-3615</CVE>
    <ProductStatuses/>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>5.4</BaseScoreV2>
        <VectorV2>AV:L/AC:M/Au:N/C:C/I:P/A:N</VectorV2>
      </ScoreSetV2>
      <ScoreSetV3>
        <BaseScoreV3>6.4</BaseScoreV3>
        <VectorV3>CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N</VectorV3>
      </ScoreSetV3>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
