Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-5715

Summary
Assigner-intel
Assigner Org ID-6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At-04 Jan, 2018 | 13:00
Updated At-06 May, 2025 | 14:59
Rejected At-
Credits

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:intel
Assigner Org ID:6dda929c-bb53-4a77-a76d-48e79601a1ce
Published At:04 Jan, 2018 | 13:00
Updated At:06 May, 2025 | 14:59
Rejected At:
▼CVE Numbering Authority (CNA)

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Affected Products
Vendor
Intel CorporationIntel Corporation
Product
Microprocessors with Speculative Execution
Versions
Affected
  • All
Problem Types
TypeCWE IDDescription
textN/AInformation Disclosure
Type: text
CWE ID: N/A
Description: Information Disclosure
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
https://spectreattack.com/
x_refsource_MISC
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://nvidia.custhelp.com/app/answers/detail/a_id/4609
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3560-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
mailing-list
x_refsource_MLIST
x_transferred
https://www.debian.org/security/2018/dsa-4187
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://usn.ubuntu.com/3542-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.gentoo.org/glsa/201810-06
vendor-advisory
x_refsource_GENTOO
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3540-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://access.redhat.com/security/vulnerabilities/speculativeexecution
x_refsource_CONFIRM
x_transferred
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
mailing-list
x_refsource_MLIST
x_transferred
https://usn.ubuntu.com/3597-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
mailing-list
x_refsource_MLIST
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4611
x_refsource_CONFIRM
x_transferred
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
x_refsource_MISC
x_transferred
https://www.debian.org/security/2018/dsa-4213
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-002
x_refsource_CONFIRM
x_transferred
https://www.debian.org/security/2018/dsa-4120
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3580-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.f5.com/csp/article/K91229003
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3531-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3620-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3582-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.debian.org/security/2018/dsa-4188
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://access.redhat.com/errata/RHSA-2018:0292
vendor-advisory
x_refsource_REDHAT
x_transferred
http://xenbits.xen.org/xsa/advisory-254.html
x_refsource_CONFIRM
x_transferred
https://security.netapp.com/advisory/ntap-20180104-0001/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.synology.com/support/security/Synology_SA_18_01
x_refsource_CONFIRM
x_transferred
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
x_refsource_MISC
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
x_refsource_CONFIRM
x_transferred
http://www.securityfocus.com/bid/102376
vdb-entry
x_refsource_BID
x_transferred
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3594-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.kb.cert.org/vuls/id/584653
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://www.kb.cert.org/vuls/id/180049
third-party-advisory
x_refsource_CERT-VN
x_transferred
https://cert.vde.com/en-us/advisories/vde-2018-003
x_refsource_CONFIRM
x_transferred
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3690-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
x_refsource_CONFIRM
x_transferred
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
x_refsource_CONFIRM
x_transferred
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
x_refsource_CONFIRM
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3549-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
x_refsource_CONFIRM
x_transferred
https://support.citrix.com/article/CTX231399
x_refsource_CONFIRM
x_transferred
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
x_refsource_CONFIRM
x_transferred
https://spectreattack.com/
x_refsource_MISC
x_transferred
https://usn.ubuntu.com/3531-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3581-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
x_refsource_CONFIRM
x_transferred
http://www.securitytracker.com/id/1040071
vdb-entry
x_refsource_SECTRACK
x_transferred
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
mailing-list
x_refsource_MLIST
x_transferred
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3597-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3581-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4614
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
mailing-list
x_refsource_MLIST
x_transferred
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
vendor-advisory
x_refsource_CISCO
x_transferred
https://usn.ubuntu.com/usn/usn-3516-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
x_refsource_CONFIRM
x_transferred
https://www.exploit-db.com/exploits/43427/
exploit
x_refsource_EXPLOIT-DB
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://usn.ubuntu.com/3541-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
x_refsource_MISC
x_transferred
https://support.lenovo.com/us/en/solutions/LEN-18282
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3777-3/
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
vendor-advisory
x_refsource_SUSE
x_transferred
https://www.vmware.com/security/advisories/VMSA-2018-0007.html
x_refsource_CONFIRM
x_transferred
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://nvidia.custhelp.com/app/answers/detail/a_id/4613
x_refsource_CONFIRM
x_transferred
https://usn.ubuntu.com/3561-1/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://usn.ubuntu.com/3582-2/
vendor-advisory
x_refsource_UBUNTU
x_transferred
https://seclists.org/bugtraq/2019/Jun/36
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
x_refsource_CONFIRM
x_transferred
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
x_refsource_MISC
x_transferred
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
x_refsource_CONFIRM
x_transferred
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
vendor-advisory
x_refsource_FREEBSD
x_transferred
https://seclists.org/bugtraq/2019/Nov/16
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
x_refsource_MISC
x_transferred
https://security.paloaltonetworks.com/CVE-2017-5715
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
mailing-list
x_refsource_MLIST
x_transferred
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3560-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://usn.ubuntu.com/3542-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.gentoo.org/glsa/201810-06
Resource:
vendor-advisory
x_refsource_GENTOO
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3540-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3580-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.f5.com/csp/article/K91229003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3620-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securityfocus.com/bid/102376
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3594-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Resource:
third-party-advisory
x_refsource_CERT-VN
x_transferred
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3690-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3549-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://support.citrix.com/article/CTX231399
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://spectreattack.com/
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://usn.ubuntu.com/3531-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.securitytracker.com/id/1040071
Resource:
vdb-entry
x_refsource_SECTRACK
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3597-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3581-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.exploit-db.com/exploits/43427/
Resource:
exploit
x_refsource_EXPLOIT-DB
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://usn.ubuntu.com/3541-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3777-3/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://usn.ubuntu.com/3561-1/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://usn.ubuntu.com/3582-2/
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Resource:
vendor-advisory
x_refsource_FREEBSD
x_transferred
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Problem Types
TypeCWE IDDescription
CWECWE-203CWE-203 Observable Discrepancy
Type: CWE
CWE ID: CWE-203
Description: CWE-203 Observable Discrepancy
Metrics
VersionBase scoreBase severityVector
3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:secure@intel.com
Published At:04 Jan, 2018 | 13:29
Updated At:06 May, 2025 | 15:15

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Secondary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Primary2.01.9LOW
AV:L/AC:M/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 1.9
Base severity: LOW
Vector:
AV:L/AC:M/Au:N/C:P/I:N/A:N
CPE Matches

Intel Corporation
intel
>>atom_c>>c2308
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2316
cpe:2.3:h:intel:atom_c:c2316:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2338
cpe:2.3:h:intel:atom_c:c2338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2350
cpe:2.3:h:intel:atom_c:c2350:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2358
cpe:2.3:h:intel:atom_c:c2358:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2508
cpe:2.3:h:intel:atom_c:c2508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2516
cpe:2.3:h:intel:atom_c:c2516:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2518
cpe:2.3:h:intel:atom_c:c2518:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2530
cpe:2.3:h:intel:atom_c:c2530:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2538
cpe:2.3:h:intel:atom_c:c2538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2550
cpe:2.3:h:intel:atom_c:c2550:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2558
cpe:2.3:h:intel:atom_c:c2558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2718
cpe:2.3:h:intel:atom_c:c2718:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2730
cpe:2.3:h:intel:atom_c:c2730:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2738
cpe:2.3:h:intel:atom_c:c2738:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2750
cpe:2.3:h:intel:atom_c:c2750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c2758
cpe:2.3:h:intel:atom_c:c2758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3308
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3338
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3508
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3538
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3558
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3708
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3750
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3758
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3808
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3830
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3850
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3858
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3950
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3955
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3958
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3805
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3815
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3825
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3826
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3827
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3845
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3130
cpe:2.3:h:intel:atom_x3:c3130:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3200rk
cpe:2.3:h:intel:atom_x3:c3200rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3205rk
cpe:2.3:h:intel:atom_x3:c3205rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3230rk
cpe:2.3:h:intel:atom_x3:c3230rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3235rk
cpe:2.3:h:intel:atom_x3:c3235rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3265rk
cpe:2.3:h:intel:atom_x3:c3265rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3295rk
cpe:2.3:h:intel:atom_x3:c3295rk:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3405
cpe:2.3:h:intel:atom_x3:c3405:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x3>>c3445
cpe:2.3:h:intel:atom_x3:c3445:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3930>>-
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3940>>-
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x7-e3950>>-
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE-203Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-203
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlsecure@intel.com
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613secure@intel.com
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614secure@intel.com
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlsecure@intel.com
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlsecure@intel.com
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtsecure@intel.com
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtsecure@intel.com
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653secure@intel.com
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlsecure@intel.com
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlsecure@intel.com
Third Party Advisory
http://www.securityfocus.com/bid/102376secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071secure@intel.com
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlsecure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292secure@intel.com
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionsecure@intel.com
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/secure@intel.com
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/secure@intel.com
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfsecure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002secure@intel.com
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003secure@intel.com
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitysecure@intel.com
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlsecure@intel.com
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixessecure@intel.com
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlsecure@intel.com
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002secure@intel.com
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-frsecure@intel.com
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascsecure@intel.com
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascsecure@intel.com
Third Party Advisory
https://security.gentoo.org/glsa/201810-06secure@intel.com
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlsecure@intel.com
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/secure@intel.com
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715secure@intel.com
Third Party Advisory
https://spectreattack.com/secure@intel.com
Third Party Advisory
https://support.citrix.com/article/CTX231399secure@intel.com
Third Party Advisory
https://support.f5.com/csp/article/K91229003secure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_ussecure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_ussecure@intel.com
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282secure@intel.com
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelsecure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3531-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3540-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3541-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3542-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3549-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3560-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3561-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3580-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3581-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3582-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3594-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3597-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3620-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3690-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3777-3/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213secure@intel.com
Third Party Advisory
https://www.exploit-db.com/exploits/43427/secure@intel.com
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049secure@intel.com
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001secure@intel.com
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlsecure@intel.com
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/secure@intel.com
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01secure@intel.com
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlsecure@intel.com
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlsecure@intel.com
Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Broken Link
http://nvidia.custhelp.com/app/answers/detail/a_id/4609af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4611af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4613af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://nvidia.custhelp.com/app/answers/detail/a_id/4614af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txtaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.kb.cert.org/vuls/id/584653af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/102376af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040071af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-254.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:0292af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/security/vulnerabilities/speculativeexecutionaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-002af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://cert.vde.com/en-us/advisories/vde-2018-003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixesaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002af854a3a-2127-422b-91ae-364da2661108
Patch
Third Party Advisory
Vendor Advisory
https://seclists.org/bugtraq/2019/Jun/36af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://seclists.org/bugtraq/2019/Nov/16af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
Mailing List
Third Party Advisory
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fraf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.ascaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201810-06af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180104-0001/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.paloaltonetworks.com/CVE-2017-5715af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://spectreattack.com/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.citrix.com/article/CTX231399af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.f5.com/csp/article/K91229003af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_usaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://support.lenovo.com/us/en/solutions/LEN-18282af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3531-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3540-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3541-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3542-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3549-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3560-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3561-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3580-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3581-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3582-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3594-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3597-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3620-2/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3690-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/3777-3/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://usn.ubuntu.com/usn/usn-3516-1/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4120af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4187af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4188af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.debian.org/security/2018/dsa-4213af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.exploit-db.com/exploits/43427/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://www.kb.cert.org/vuls/id/180049af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlaf854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: secure@intel.com
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: secure@intel.com
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4609
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4611
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4613
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://nvidia.custhelp.com/app/answers/detail/a_id/4614
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.kb.cert.org/vuls/id/584653
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/102376
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040071
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-254.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:0292
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/security/vulnerabilities/speculativeexecution
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://cert.vde.com/en-us/advisories/vde-2018-003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Nov/16
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.gentoo.org/glsa/201810-06
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180104-0001/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://security.paloaltonetworks.com/CVE-2017-5715
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://spectreattack.com/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX231399
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.f5.com/csp/article/K91229003
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://support.lenovo.com/us/en/solutions/LEN-18282
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3531-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3540-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3541-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3542-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3549-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3560-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3561-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3580-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3581-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3582-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3594-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3597-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3620-2/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3690-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/usn/usn-3516-1/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4120
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4187
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4188
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4213
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/43427/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/security/advisories/VMSA-2018-0007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
Hyperlink: https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

0Records found

Details not found