CVE-2018-3639

Source
https://cve.org/CVERecord?id=CVE-2018-3639
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-3639.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-3639
Downstream
Related
Published
2018-05-22T12:29:00.250Z
Modified
2026-02-24T08:07:11.860593Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

References

Affected packages

Git / github.com/rsyslog/librelp

Affected ranges

Type
GIT
Repo
https://github.com/rsyslog/librelp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

good-1.*
good-1.1.2
v.*
v.1.2.18
v0.*
v0.1.0
v0.1.1
v0.1.3
v1.*
v1.0.0
v1.0.1
v1.0.2
v1.0.3
v1.0.5
v1.0.6
v1.0.7
v1.1.0
v1.1.1
v1.1.2
v1.1.3
v1.1.4
v1.1.5
v1.2.0
v1.2.1
v1.2.10
v1.2.11
v1.2.12
v1.2.13
v1.2.14
v1.2.15
v1.2.16
v1.2.17
v1.2.2
v1.2.3
v1.2.4
v1.2.5
v1.2.7
v1.2.8
v1.2.9
v1.3.0
v1.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-3639.json"