{"id":"MGASA-2018-0262","summary":"Updated libvirt packages fix security vulnerability","details":"Systems with microprocessors utilizing speculative execution and\nspeculative execution of memory reads before the addresses of all\nprior memory writes are known may allow unauthorized disclosure of\ninformation to an attacker with local user access via a side-channel\nanalysis, aka Speculative Store Bypass (SSB), Variant 4\n(CVE-2018-3639).\n","modified":"2026-04-16T06:24:18.814818528Z","published":"2018-05-31T20:34:08Z","upstream":["CVE-2018-3639"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2018-0262.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=23072"},{"type":"WEB","url":"https://access.redhat.com/security/cve/cve-2018-3639"}],"affected":[{"package":{"name":"libvirt","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/libvirt?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.10.0-1.3.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2018-0262.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}