Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2018-3639
Analyzed
More InfoOfficial Page
Source-secure@intel.com
View Known Exploited Vulnerability (KEV) details
Published At-22 May, 2018 | 12:29
Updated At-13 Aug, 2021 | 15:26

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Intel Corporation
intel
>>atom_c>>c2308
cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3308
cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3338
cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3508
cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3538
cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3558
cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3708
cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3750
cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3758
cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3808
cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3830
cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3850
cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3858
cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3950
cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3955
cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_c>>c3958
cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3805
cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3815
cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3825
cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3826
cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3827
cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_e>>e3845
cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3930>>-
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x5-e3940>>-
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_x7-e3950>>-
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2420
cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2460
cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2480
cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2520
cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2560
cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2580
cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z2760
cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3460
cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3480
cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3530
cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3560
cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3570
cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3580
cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3590
cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3735d
cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3735e
cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3735f
cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3735g
cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3736f
cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3736g
cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3740
cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3740d
cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3745
cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3745d
cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*
Intel Corporation
intel
>>atom_z>>z3770
cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-203Primarynvd@nist.gov
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.htmlsecure@intel.com
Broken Link
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.htmlsecure@intel.com
Broken Link
http://support.lenovo.com/us/en/solutions/LEN-22133secure@intel.com
Third Party Advisory
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.htmlsecure@intel.com
Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/1secure@intel.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/2secure@intel.com
Mailing List
Third Party Advisory
http://www.openwall.com/lists/oss-security/2020/06/10/5secure@intel.com
Mailing List
Third Party Advisory
http://www.securityfocus.com/bid/104232secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1040949secure@intel.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1042004secure@intel.com
Third Party Advisory
VDB Entry
http://xenbits.xen.org/xsa/advisory-263.htmlsecure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1629secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1630secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1632secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1633secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1635secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1636secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1637secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1638secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1639secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1640secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1641secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1642secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1643secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1644secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1645secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1646secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1647secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1648secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1649secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1650secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1651secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1652secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1653secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1654secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1655secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1656secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1657secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1658secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1659secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1660secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1661secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1662secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1663secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1664secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1665secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1666secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1667secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1668secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1669secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1674secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1675secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1676secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1686secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1688secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1689secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1690secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1696secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1710secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1711secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1737secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1738secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1826secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1854secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1965secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1967secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:1997secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2001secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2003secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2006secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2060secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2161secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2162secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2164secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2171secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2172secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2216secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2228secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2246secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2250secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2258secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2289secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2309secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2328secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2363secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2364secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2387secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2394secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2396secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:2948secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3396secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3397secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3398secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3399secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3400secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3401secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3402secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3407secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3423secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3424secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2018:3425secure@intel.com
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0148secure@intel.com
Broken Link
https://access.redhat.com/errata/RHSA-2019:1046secure@intel.com
Third Party Advisory
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528secure@intel.com
Exploit
Issue Tracking
Patch
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdfsecure@intel.com
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdfsecure@intel.com
Third Party Advisory
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfsecure@intel.com
Third Party Advisory
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilitysecure@intel.com
Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0secure@intel.com
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlsecure@intel.com
Mailing List
Third Party Advisory
https://nvidia.custhelp.com/app/answers/detail/a_id/4787secure@intel.com
Third Party Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012secure@intel.com
Patch
Third Party Advisory
Vendor Advisory
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004secure@intel.com
Third Party Advisory
https://seclists.org/bugtraq/2019/Jun/36secure@intel.com
Issue Tracking
Mailing List
Third Party Advisory
https://security.netapp.com/advisory/ntap-20180521-0001/secure@intel.com
Third Party Advisory
https://support.citrix.com/article/CTX235225secure@intel.com
Third Party Advisory
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_ussecure@intel.com
Third Party Advisory
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.htmlsecure@intel.com
Third Party Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannelsecure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3651-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3652-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3653-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3653-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3654-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3654-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3655-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3655-2/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3679-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3680-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3756-1/secure@intel.com
Third Party Advisory
https://usn.ubuntu.com/3777-3/secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4210secure@intel.com
Third Party Advisory
https://www.debian.org/security/2018/dsa-4273secure@intel.com
Third Party Advisory
https://www.exploit-db.com/exploits/44695/secure@intel.com
Exploit
Third Party Advisory
VDB Entry
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.htmlsecure@intel.com
Third Party Advisory
https://www.kb.cert.org/vuls/id/180049secure@intel.com
Third Party Advisory
US Government Resource
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006secure@intel.com
Third Party Advisory
https://www.oracle.com/security-alerts/cpujul2020.htmlsecure@intel.com
Third Party Advisory
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlsecure@intel.com
Third Party Advisory
https://www.synology.com/support/security/Synology_SA_18_23secure@intel.com
Third Party Advisory
https://www.us-cert.gov/ncas/alerts/TA18-141Asecure@intel.com
Third Party Advisory
US Government Resource
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: http://support.lenovo.com/us/en/solutions/LEN-22133
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2020/06/10/1
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2020/06/10/2
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2020/06/10/5
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: http://www.securityfocus.com/bid/104232
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1040949
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1042004
Source: secure@intel.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://xenbits.xen.org/xsa/advisory-263.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1629
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1630
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1632
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1633
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1635
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1636
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1637
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1638
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1639
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1640
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1641
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1642
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1643
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1644
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1645
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1646
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1647
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1648
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1649
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1650
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1651
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1652
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1653
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1654
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1655
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1656
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1657
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1658
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1659
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1660
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1661
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1662
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1663
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1664
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1665
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1666
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1667
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1668
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1669
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1674
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1675
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1676
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1686
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1688
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1689
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1690
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1696
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1710
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1711
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1737
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1738
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1826
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1854
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1965
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1967
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:1997
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2001
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2003
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2006
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2060
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2161
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2162
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2164
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2171
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2172
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2216
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2228
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2246
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2250
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2258
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2289
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2309
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2328
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2363
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2364
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2387
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2394
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2396
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:2948
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3396
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3397
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3398
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3399
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3400
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3401
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3402
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3407
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3423
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3424
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2018:3425
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://access.redhat.com/errata/RHSA-2019:0148
Source: secure@intel.com
Resource:
Broken Link
Hyperlink: https://access.redhat.com/errata/RHSA-2019:1046
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
Source: secure@intel.com
Resource:
Exploit
Issue Tracking
Patch
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
Source: secure@intel.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://nvidia.custhelp.com/app/answers/detail/a_id/4787
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012
Source: secure@intel.com
Resource:
Patch
Third Party Advisory
Vendor Advisory
Hyperlink: https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://seclists.org/bugtraq/2019/Jun/36
Source: secure@intel.com
Resource:
Issue Tracking
Mailing List
Third Party Advisory
Hyperlink: https://security.netapp.com/advisory/ntap-20180521-0001/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.citrix.com/article/CTX235225
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3651-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3652-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3653-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3653-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3654-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3654-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3655-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3655-2/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3679-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3680-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3756-1/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://usn.ubuntu.com/3777-3/
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4210
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.debian.org/security/2018/dsa-4273
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.exploit-db.com/exploits/44695/
Source: secure@intel.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.kb.cert.org/vuls/id/180049
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/security-alerts/cpujul2020.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.synology.com/support/security/Synology_SA_18_23
Source: secure@intel.com
Resource:
Third Party Advisory
Hyperlink: https://www.us-cert.gov/ncas/alerts/TA18-141A
Source: secure@intel.com
Resource:
Third Party Advisory
US Government Resource
Change History
0Changes found

Details not found