5.6
CVSSv3

CVE-2017-5715

Published: 04/01/2018 Updated: 16/08/2021
CVSS v2 Base Score: 1.9 | Impact Score: 2.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 5.6 | Impact Score: 4 | Exploitability Score: 1.1
VMScore: 209
Vector: AV:L/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel atom c c2308

intel atom c c2316

intel atom c c2338

intel atom c c2350

intel atom c c2358

intel atom c c2508

intel atom c c2516

intel atom c c2518

intel atom c c2530

intel atom c c2538

intel atom c c2550

intel atom c c2558

intel atom c c2718

intel atom c c2730

intel atom c c2738

intel atom c c2750

intel atom c c2758

intel atom c c3308

intel atom c c3338

intel atom c c3508

intel atom c c3538

intel atom c c3558

intel atom c c3708

intel atom c c3750

intel atom c c3758

intel atom c c3808

intel atom c c3830

intel atom c c3850

intel atom c c3858

intel atom c c3950

intel atom c c3955

intel atom c c3958

intel atom e e3805

intel atom e e3815

intel atom e e3825

intel atom e e3826

intel atom e e3827

intel atom e e3845

intel atom x3 c3130

intel atom x3 c3200rk

intel atom x3 c3205rk

intel atom x3 c3230rk

intel atom x3 c3235rk

intel atom x3 c3265rk

intel atom x3 c3295rk

intel atom x3 c3405

intel atom x3 c3445

intel atom x5-e3930 -

intel atom x5-e3940 -

intel atom x7-e3950 -

intel atom z z2420

intel atom z z2460

intel atom z z2480

intel atom z z2520

intel atom z z2560

intel atom z z2580

intel atom z z2760

intel atom z z3460

intel atom z z3480

intel atom z z3530

intel atom z z3560

intel atom z z3570

intel atom z z3580

intel atom z z3590

intel atom z z3735d

intel atom z z3735e

intel atom z z3735f

intel atom z z3735g

intel atom z z3736f

intel atom z z3736g

intel atom z z3740

intel atom z z3740d

intel atom z z3745

intel atom z z3745d

intel atom z z3770

intel atom z z3770d

intel atom z z3775

intel atom z z3775d

intel atom z z3785

intel atom z z3795

intel celeron j j1750

intel celeron j j1800

intel celeron j j1850

intel celeron j j1900

intel celeron j j3060

intel celeron j j3160

intel celeron j j3355

intel celeron j j3455

intel celeron j j4005

intel celeron j j4105

intel celeron n n2805

intel celeron n n2806

intel celeron n n2807

intel celeron n n2808

intel celeron n n2810

intel celeron n n2815

intel celeron n n2820

intel celeron n n2830

intel celeron n n2840

intel celeron n n2910

intel celeron n n2920

intel celeron n n2930

intel celeron n n2940

intel celeron n n3000

intel celeron n n3010

intel celeron n n3050

intel celeron n n3060

intel celeron n n3150

intel celeron n n3160

intel celeron n n3350

intel celeron n n3450

intel celeron n n4000

intel celeron n n4100

intel core i3 330e

intel core i3 330m

intel core i3 330um

intel core i3 350m

intel core i3 370m

intel core i3 380m

intel core i3 380um

intel core i3 390m

intel core i3 530

intel core i3 540

intel core i3 550

intel core i3 560

intel core i3 2100

intel core i3 2100t

intel core i3 2102

intel core i3 2105

intel core i3 2115c

intel core i3 2120

intel core i3 2120t

intel core i3 2125

intel core i3 2130

intel core i3 2310e

intel core i3 2310m

intel core i3 2312m

intel core i3 2328m

intel core i3 2330e

intel core i3 2330m

intel core i3 2340ue

intel core i3 2348m

intel core i3 2350m

intel core i3 2357m

intel core i3 2365m

intel core i3 2367m

intel core i3 2370m

intel core i3 2375m

intel core i3 2377m

intel core i3 3110m

intel core i3 3115c

intel core i3 3120m

intel core i3 3120me

intel core i3 3130m

intel core i3 3210

intel core i3 3217u

intel core i3 3217ue

intel core i3 3220

intel core i3 3220t

intel core i3 3225

intel core i3 3227u

intel core i3 3229y

intel core i3 3240

intel core i3 3240t

intel core i3 3245

intel core i3 3250

intel core i3 3250t

intel core i3 4000m

intel core i3 4005u

intel core i3 4010u

intel core i3 4010y

intel core i3 4012y

intel core i3 4020y

intel core i3 4025u

intel core i3 4030u

intel core i3 4030y

intel core i3 4100e

intel core i3 4100m

intel core i3 4100u

intel core i3 4102e

intel core i3 4110e

intel core i3 4110m

intel core i3 4112e

intel core i3 4120u

intel core i3 4130

intel core i3 4130t

intel core i3 4150

intel core i3 4150t

intel core i3 4158u

intel core i3 4160

intel core i3 4160t

intel core i3 4170

intel core i3 4170t

intel core i3 4330

intel core i3 4330t

intel core i3 4330te

intel core i3 4340

intel core i3 4340te

intel core i3 4350

intel core i3 4350t

intel core i3 4360

intel core i3 4360t

intel core i3 4370

intel core i3 4370t

intel core i3 5005u

intel core i3 5010u

intel core i3 5015u

intel core i3 5020u

intel core i3 5157u

intel core i3 6006u

intel core i3 6098p

intel core i3 6100

intel core i3 6100e

intel core i3 6100h

intel core i3 6100t

intel core i3 6100te

intel core i3 6100u

intel core i3 6102e

intel core i3 6157u

intel core i3 6167u

intel core i3 6300

intel core i3 6300t

intel core i3 6320

intel core i3 8100

intel core i3 8350k

intel core i5 430m

intel core i5 430um

intel core i5 450m

intel core i5 460m

intel core i5 470um

intel core i5 480m

intel core i5 520e

intel core i5 520m

intel core i5 520um

intel core i5 540m

intel core i5 540um

intel core i5 560m

intel core i5 560um

intel core i5 580m

intel core i5 650

intel core i5 655k

intel core i5 660

intel core i5 661

intel core i5 670

intel core i5 680

intel core i5 750

intel core i5 750s

intel core i5 760

intel core i5 2300

intel core i5 2310

intel core i5 2320

intel core i5 2380p

intel core i5 2390t

intel core i5 2400

intel core i5 2400s

intel core i5 2405s

intel core i5 2410m

intel core i5 2430m

intel core i5 2435m

intel core i5 2450m

intel core i5 2450p

intel core i5 2467m

intel core i5 2500

intel core i5 2500k

intel core i5 2500s

intel core i5 2500t

intel core i5 2510e

intel core i5 2515e

intel core i5 2520m

intel core i5 2537m

intel core i5 2540m

intel core i5 2550k

intel core i5 2557m

intel core i5 3210m

intel core i5 3230m

intel core i5 3317u

intel core i5 3320m

intel core i5 3330

intel core i5 3330s

intel core i5 3337u

intel core i5 3339y

intel core i5 3340

intel core i5 3340m

intel core i5 3340s

intel core i5 3350p

intel core i5 3360m

intel core i5 3380m

intel core i5 3427u

intel core i5 3437u

intel core i5 3439y

intel core i5 3450

intel core i5 3450s

intel core i5 3470

intel core i5 3470s

intel core i5 3470t

intel core i5 3475s

intel core i5 3550

intel core i5 3550s

intel core i5 3570

intel core i5 3570k

intel core i5 3570s

intel core i5 3570t

intel core i5 3610me

intel core i5 4200h

intel core i5 4200m

intel core i5 4200u

intel core i5 4200y

intel core i5 4202y

intel core i5 4210h

intel core i5 4210m

intel core i5 4210u

intel core i5 4210y

intel core i5 4220y

intel core i5 4250u

intel core i5 4258u

intel core i5 4260u

intel core i5 4278u

intel core i5 4288u

intel core i5 4300m

intel core i5 4300u

intel core i5 4300y

intel core i5 4302y

intel core i5 4308u

intel core i5 4310m

intel core i5 4310u

intel core i5 4330m

intel core i5 4340m

intel core i5 4350u

intel core i5 4360u

intel core i5 4400e

intel core i5 4402e

intel core i5 4402ec

intel core i5 4410e

intel core i5 4422e

intel core i5 4430

intel core i5 4430s

intel core i5 4440

intel core i5 4440s

intel core i5 4460

intel core i5 4460s

intel core i5 4460t

intel core i5 4570

intel core i5 4570r

intel core i5 4570s

intel core i5 4570t

intel core i5 4570te

intel core i5 4590

intel core i5 4590s

intel core i5 4590t

intel core i5 4670

intel core i5 4670k

intel core i5 4670r

intel core i5 4670s

intel core i5 4670t

intel core i5 4690

intel core i5 4690k

intel core i5 4690s

intel core i5 4690t

intel core i5 5200u

intel core i5 5250u

intel core i5 5257u

intel core i5 5287u

intel core i5 5300u

intel core i5 5350h

intel core i5 5350u

intel core i5 5575r

intel core i5 5675c

intel core i5 5675r

intel core i5 6200u

intel core i5 6260u

intel core i5 6267u

intel core i5 6287u

intel core i5 6300hq

intel core i5 6300u

intel core i5 6350hq

intel core i5 6360u

intel core i5 6400

intel core i5 6400t

intel core i5 6402p

intel core i5 6440eq

intel core i5 6440hq

intel core i5 6442eq

intel core i5 6500

intel core i5 6500t

intel core i5 6500te

intel core i5 6585r

intel core i5 6600

intel core i5 6600k

intel core i5 6600t

intel core i5 6685r

intel core i5 8250u

intel core i5 8350u

intel core i5 8400

intel core i5 8600k

intel core i7 7y75

intel core i7 610e

intel core i7 620le

intel core i7 620lm

intel core i7 620m

intel core i7 620ue

intel core i7 620um

intel core i7 640lm

intel core i7 640m

intel core i7 640um

intel core i7 660lm

intel core i7 660ue

intel core i7 660um

intel core i7 680um

intel core i7 720qm

intel core i7 740qm

intel core i7 820qm

intel core i7 840qm

intel core i7 860

intel core i7 860s

intel core i7 870

intel core i7 870s

intel core i7 875k

intel core i7 880

intel core i7 920

intel core i7 920xm

intel core i7 930

intel core i7 940

intel core i7 940xm

intel core i7 950

intel core i7 960

intel core i7 965

intel core i7 970

intel core i7 975

intel core i7 980

intel core i7 980x

intel core i7 990x

intel core i7 2600

intel core i7 2600k

intel core i7 2600s

intel core i7 2610ue

intel core i7 2617m

intel core i7 2620m

intel core i7 2629m

intel core i7 2630qm

intel core i7 2635qm

intel core i7 2637m

intel core i7 2640m

intel core i7 2649m

intel core i7 2655le

intel core i7 2657m

intel core i7 2670qm

intel core i7 2675qm

intel core i7 2677m

intel core i7 2700k

intel core i7 2710qe

intel core i7 2715qe

intel core i7 2720qm

intel core i7 2760qm

intel core i7 2820qm

intel core i7 2860qm

intel core i7 2920xm

intel core i7 2960xm

intel core i7 3517u

intel core i7 3517ue

intel core i7 3520m

intel core i7 3537u

intel core i7 3540m

intel core i7 3555le

intel core i7 3610qe

intel core i7 3610qm

intel core i7 3612qe

intel core i7 3612qm

intel core i7 3615qe

intel core i7 3615qm

intel core i7 3630qm

intel core i7 3632qm

intel core i7 3635qm

intel core i7 3667u

intel core i7 3687u

intel core i7 3689y

intel core i7 3720qm

intel core i7 3740qm

intel core i7 3770

intel core i7 3770k

intel core i7 3770s

intel core i7 3770t

intel core i7 3820qm

intel core i7 3840qm

intel core i7 4500u

intel core i7 4510u

intel core i7 4550u

intel core i7 4558u

intel core i7 4578u

intel core i7 4600m

intel core i7 4600u

intel core i7 4610m

intel core i7 4610y

intel core i7 4650u

intel core i7 4700ec

intel core i7 4700eq

intel core i7 4700hq

intel core i7 4700mq

intel core i7 4702ec

intel core i7 4702hq

intel core i7 4702mq

intel core i7 4710hq

intel core i7 4710mq

intel core i7 4712hq

intel core i7 4712mq

intel core i7 4720hq

intel core i7 4722hq

intel core i7 4750hq

intel core i7 4760hq

intel core i7 4765t

intel core i7 4770

intel core i7 4770hq

intel core i7 4770k

intel core i7 4770r

intel core i7 4770s

intel core i7 4770t

intel core i7 4770te

intel core i7 4771

intel core i7 4785t

intel core i7 4790

intel core i7 4790k

intel core i7 4790s

intel core i7 4790t

intel core i7 4800mq

intel core i7 4810mq

intel core i7 4850hq

intel core i7 4860hq

intel core i7 4870hq

intel core i7 4900mq

intel core i7 4910mq

intel core i7 4950hq

intel core i7 4960hq

intel core i7 4980hq

intel core i7 5500u

intel core i7 5550u

intel core i7 5557u

intel core i7 5600u

intel core i7 5650u

intel core i7 5700eq

intel core i7 5700hq

intel core i7 5750hq

intel core i7 5775c

intel core i7 5775r

intel core i7 5850eq

intel core i7 5850hq

intel core i7 5950hq

intel core i7 7500u

intel core i7 7560u

intel core i7 7567u

intel core i7 7600u

intel core i7 7660u

intel core i7 7700

intel core i7 7700hq

intel core i7 7700k

intel core i7 7700t

intel core i7 7820eq

intel core i7 7820hk

intel core i7 7820hq

intel core i7 7920hq

intel core i7 8550u

intel core i7 8650u

intel core i7 8700

intel core i7 8700k

intel core m 5y10

intel core m 5y10a

intel core m 5y10c

intel core m 5y31

intel core m 5y51

intel core m 5y70

intel core m 5y71

intel core m3 6y30

intel core m3 7y30

intel core m3 7y32

intel core m5 6y54

intel core m5 6y57

intel core m7 6y75

intel pentium j j2850

intel pentium j j2900

intel pentium j j3710

intel pentium j j4205

intel pentium n n3510

intel pentium n n3520

intel pentium n n3530

intel pentium n n3540

intel pentium n n3700

intel pentium n n3710

intel pentium n n4200

intel xeon e5502

intel xeon e5503

intel xeon e5504

intel xeon e5506

intel xeon e5507

intel xeon e5520

intel xeon e5530

intel xeon e5540

intel xeon e5603

intel xeon e5606

intel xeon e5607

intel xeon e5620

intel xeon e5630

intel xeon e5640

intel xeon e5645

intel xeon e5649

intel xeon e6510

intel xeon e6540

intel xeon e7520

intel xeon e7530

intel xeon e7540

intel xeon ec5509

intel xeon ec5539

intel xeon ec5549

intel xeon l3406

intel xeon l3426

intel xeon l5506

intel xeon l5508

intel xeon l5518

intel xeon l5520

intel xeon l5530

intel xeon l5609

intel xeon l5618

intel xeon l5630

intel xeon l5638

intel xeon l5640

intel xeon l7545

intel xeon l7555

intel xeon lc5518

intel xeon lc5528

intel xeon w3670

intel xeon w3680

intel xeon w3690

intel xeon w5580

intel xeon w5590

intel xeon x3430

intel xeon x3440

intel xeon x3450

intel xeon x3460

intel xeon x3470

intel xeon x3480

intel xeon x5550

intel xeon x5560

intel xeon x5570

intel xeon x5647

intel xeon x5650

intel xeon x5660

intel xeon x5667

intel xeon x5670

intel xeon x5672

intel xeon x5675

intel xeon x5677

intel xeon x5680

intel xeon x5687

intel xeon x5690

intel xeon x6550

intel xeon x7542

intel xeon x7550

intel xeon x7560

intel xeon bronze 3104 -

intel xeon bronze 3106 -

intel xeon e-1105c -

intel xeon e3 1505m_v6

intel xeon e3 1515m_v5

intel xeon e3 1535m_v5

intel xeon e3 1535m_v6

intel xeon e3 1545m_v5

intel xeon e3 1558l_v5

intel xeon e3 1565l_v5

intel xeon e3 1575m_v5

intel xeon e3 1578l_v5

intel xeon e3 1585_v5

intel xeon e3 1585l_v5

intel xeon e3 1105c v2 -

intel xeon e3 1125c -

intel xeon e3 1125c v2 -

intel xeon e3 1220 -

intel xeon e3 12201 -

intel xeon e3 12201 v2 -

intel xeon e3 1220 v2 -

intel xeon e3 1220 v3 -

intel xeon e3 1220 v5 -

intel xeon e3 1220 v6 -

intel xeon e3 1220l v3 -

intel xeon e3 1225 -

intel xeon e3 1225 v2 -

intel xeon e3 1225 v3 -

intel xeon e3 1225 v5 -

intel xeon e3 1225 v6 -

intel xeon e3 1226 v3 -

intel xeon e3 1230 -

intel xeon e3 1230 v2 -

intel xeon e3 1230 v3 -

intel xeon e3 1230 v5 -

intel xeon e3 1230 v6 -

intel xeon e3 1230l v3 -

intel xeon e3 1231 v3 -

intel xeon e3 1235 -

intel xeon e3 1235l v5 -

intel xeon e3 1240 -

intel xeon e3 1240 v2 -

intel xeon e3 1240 v3 -

intel xeon e3 1240 v5 -

intel xeon e3 1240 v6 -

intel xeon e3 1240l v3 -

intel xeon e3 1240l v5 -

intel xeon e3 1241 v3 -

intel xeon e3 1245 -

intel xeon e3 1245 v2 -

intel xeon e3 1245 v3 -

intel xeon e3 1245 v5 -

intel xeon e3 1245 v6 -

intel xeon e3 1246 v3 -

intel xeon e3 1258l v4 -

intel xeon e3 1260l -

intel xeon e3 1260l v5 -

intel xeon e3 1265l v2 -

intel xeon e3 1265l v3 -

intel xeon e3 1265l v4 -

intel xeon e3 1268l v3 -

intel xeon e3 1268l v5 -

intel xeon e3 1270 -

intel xeon e3 1270 v2 -

intel xeon e3 1270 v3 -

intel xeon e3 1270 v5 -

intel xeon e3 1270 v6 -

intel xeon e3 1271 v3 -

intel xeon e3 1275 -

intel xeon e3 1275 v2 -

intel xeon e3 1275 v3 -

intel xeon e3 1275 v5 -

intel xeon e3 1275 v6 -

intel xeon e3 1275l v3 -

intel xeon e3 1276 v3 -

intel xeon e3 1278l v4 -

intel xeon e3 1280 -

intel xeon e3 1280 v2 -

intel xeon e3 1280 v3 -

intel xeon e3 1280 v5 -

intel xeon e3 1280 v6 -

intel xeon e3 1281 v3 -

intel xeon e3 1285 v3 -

intel xeon e3 1285 v4 -

intel xeon e3 1285 v6 -

intel xeon e3 1285l v3 -

intel xeon e3 1285l v4 -

intel xeon e3 1286 v3 -

intel xeon e3 1286l v3 -

intel xeon e3 1290 -

intel xeon e3 1290 v2 -

intel xeon e3 1501l v6 -

intel xeon e3 1501m v6 -

intel xeon e3 1505l v5 -

intel xeon e3 1505l v6 -

intel xeon e3 1505m v5 -

intel xeon e5 2650l_v4

intel xeon e5 2658

intel xeon e5 2658_v2

intel xeon e5 2658_v3

intel xeon e5 2658_v4

intel xeon e5 2658a_v3

intel xeon e5 2660

intel xeon e5 2660_v2

intel xeon e5 2660_v3

intel xeon e5 2660_v4

intel xeon e5 2665

intel xeon e5 2667

intel xeon e5 2667_v2

intel xeon e5 2667_v3

intel xeon e5 2667_v4

intel xeon e5 2670

intel xeon e5 2670_v2

intel xeon e5 2670_v3

intel xeon e5 2680

intel xeon e5 2680_v2

intel xeon e5 2680_v3

intel xeon e5 2680_v4

intel xeon e5 2683_v3

intel xeon e5 2683_v4

intel xeon e5 2687w

intel xeon e5 2687w_v2

intel xeon e5 2687w_v3

intel xeon e5 2687w_v4

intel xeon e5 2690

intel xeon e5 2690_v2

intel xeon e5 2690_v3

intel xeon e5 2690_v4

intel xeon e5 2695_v2

intel xeon e5 2695_v3

intel xeon e5 2695_v4

intel xeon e5 2697_v2

intel xeon e5 2697_v3

intel xeon e5 2697_v4

intel xeon e5 2697a_v4

intel xeon e5 2698_v3

intel xeon e5 2698_v4

intel xeon e5 2699_v3

intel xeon e5 2699_v4

intel xeon e5 2699a_v4

intel xeon e5 2699r_v4

intel xeon e5 4603

intel xeon e5 4603_v2

intel xeon e5 4607

intel xeon e5 4607_v2

intel xeon e5 4610

intel xeon e5 4610_v2

intel xeon e5 4610_v3

intel xeon e5 4610_v4

intel xeon e5 4617

intel xeon e5 4620

intel xeon e5 4620_v2

intel xeon e5 4620_v3

intel xeon e5 4620_v4

intel xeon e5 4624l_v2

intel xeon e5 4627_v2

intel xeon e5 4627_v3

intel xeon e5 4627_v4

intel xeon e5 4628l_v4

intel xeon e5 4640

intel xeon e5 4640_v2

intel xeon e5 4640_v3

intel xeon e5 4640_v4

intel xeon e5 4648_v3

intel xeon e5 4650

intel xeon e5 4650_v2

intel xeon e5 4650_v3

intel xeon e5 4650_v4

intel xeon e5 4650l

intel xeon e5 4655_v3

intel xeon e5 4655_v4

intel xeon e5 4657l_v2

intel xeon e5 4660_v3

intel xeon e5 4660_v4

intel xeon e5 4667_v3

intel xeon e5 4667_v4

intel xeon e5 4669_v3

intel xeon e5 4669_v4

intel xeon e5 1428l -

intel xeon e5 1428l v2 -

intel xeon e5 1428l v3 -

intel xeon e5 1620 -

intel xeon e5 1620 v2 -

intel xeon e5 1620 v3 -

intel xeon e5 1620 v4 -

intel xeon e5 1630 v3 -

intel xeon e5 1630 v4 -

intel xeon e5 1650 -

intel xeon e5 1650 v2 -

intel xeon e5 1650 v3 -

intel xeon e5 1650 v4 -

intel xeon e5 1660 -

intel xeon e5 1660 v2 -

intel xeon e5 1660 v3 -

intel xeon e5 1660 v4 -

intel xeon e5 1680 v3 -

intel xeon e5 1680 v4 -

intel xeon e5 2403 -

intel xeon e5 2403 v2 -

intel xeon e5 2407 -

intel xeon e5 2407 v2 -

intel xeon e5 2408l v3 -

intel xeon e5 2418l -

intel xeon e5 2418l v2 -

intel xeon e5 2418l v3 -

intel xeon e5 2420 -

intel xeon e5 2420 v2 -

intel xeon e5 2428l -

intel xeon e5 2428l v2 -

intel xeon e5 2428l v3 -

intel xeon e5 2430 -

intel xeon e5 2430 v2 -

intel xeon e5 2430l -

intel xeon e5 2430l v2 -

intel xeon e5 2438l v3 -

intel xeon e5 2440 -

intel xeon e5 2440 v2 -

intel xeon e5 2448l -

intel xeon e5 2448l v2 -

intel xeon e5 2450 -

intel xeon e5 2450 v2 -

intel xeon e5 2450l -

intel xeon e5 2450l v2 -

intel xeon e5 2470 -

intel xeon e5 2470 v2 -

intel xeon e5 2603 -

intel xeon e5 2603 v2 -

intel xeon e5 2603 v3 -

intel xeon e5 2603 v4 -

intel xeon e5 2608l v3 -

intel xeon e5 2608l v4 -

intel xeon e5 2609 -

intel xeon e5 2609 v2 -

intel xeon e5 2609 v3 -

intel xeon e5 2609 v4 -

intel xeon e5 2618l v2 -

intel xeon e5 2618l v3 -

intel xeon e5 2618l v4 -

intel xeon e5 2620 -

intel xeon e5 2620 v2 -

intel xeon e5 2620 v3 -

intel xeon e5 2620 v4 -

intel xeon e5 2623 v3 -

intel xeon e5 2623 v4 -

intel xeon e5 2628l v2 -

intel xeon e5 2628l v3 -

intel xeon e5 2628l v4 -

intel xeon e5 2630 -

intel xeon e5 2630 v2 -

intel xeon e5 2630 v3 -

intel xeon e5 2630 v4 -

intel xeon e5 2630l -

intel xeon e5 2630l v2 -

intel xeon e5 2630l v3 -

intel xeon e5 2630l v4 -

intel xeon e5 2637 -

intel xeon e5 2637 v2 -

intel xeon e5 2637 v3 -

intel xeon e5 2637 v4 -

intel xeon e5 2640 -

intel xeon e5 2640 v2 -

intel xeon e5 2640 v3 -

intel xeon e5 2640 v4 -

intel xeon e5 2643 -

intel xeon e5 2643 v2 -

intel xeon e5 2643 v3 -

intel xeon e5 2643 v4 -

intel xeon e5 2648l -

intel xeon e5 2648l v2 -

intel xeon e5 2648l v3 -

intel xeon e5 2648l v4 -

intel xeon e5 2650 -

intel xeon e5 2650 v2 -

intel xeon e5 2650 v3 -

intel xeon e5 2650 v4 -

intel xeon e5 2650l -

intel xeon e5 2650l v2 -

intel xeon e5 2650l v3 -

intel xeon e7 2803

intel xeon e7 2820

intel xeon e7 2830

intel xeon e7 2850

intel xeon e7 2850_v2

intel xeon e7 2860

intel xeon e7 2870

intel xeon e7 2870_v2

intel xeon e7 2880_v2

intel xeon e7 2890_v2

intel xeon e7 4807

intel xeon e7 4809_v2

intel xeon e7 4809_v3

intel xeon e7 4809_v4

intel xeon e7 4820

intel xeon e7 4820_v2

intel xeon e7 4820_v3

intel xeon e7 4820_v4

intel xeon e7 4830

intel xeon e7 4830_v2

intel xeon e7 4830_v3

intel xeon e7 4830_v4

intel xeon e7 4850

intel xeon e7 4850_v2

intel xeon e7 4850_v3

intel xeon e7 4850_v4

intel xeon e7 4860

intel xeon e7 4860_v2

intel xeon e7 4870

intel xeon e7 4870_v2

intel xeon e7 4880_v2

intel xeon e7 4890_v2

intel xeon e7 8830

intel xeon e7 8837

intel xeon e7 8850

intel xeon e7 8850_v2

intel xeon e7 8857_v2

intel xeon e7 8860

intel xeon e7 8860_v3

intel xeon e7 8860_v4

intel xeon e7 8867_v3

intel xeon e7 8867_v4

intel xeon e7 8867l

intel xeon e7 8870

intel xeon e7 8870_v2

intel xeon e7 8870_v3

intel xeon e7 8870_v4

intel xeon e7 8880_v2

intel xeon e7 8880_v3

intel xeon e7 8880_v4

intel xeon e7 8880l_v2

intel xeon e7 8880l_v3

intel xeon e7 8890_v2

intel xeon e7 8890_v3

intel xeon e7 8890_v4

intel xeon e7 8891_v2

intel xeon e7 8891_v3

intel xeon e7 8891_v4

intel xeon e7 8893_v2

intel xeon e7 8893_v3

intel xeon e7 8893_v4

intel xeon e7 8894_v4

intel xeon gold 5115

intel xeon gold 5118

intel xeon gold 5119t

intel xeon gold 5120

intel xeon gold 5120t

intel xeon gold 5122

intel xeon gold 6126

intel xeon gold 6126f

intel xeon gold 6126t

intel xeon gold 6128

intel xeon gold 6130

intel xeon gold 6130f

intel xeon gold 6130t

intel xeon gold 6132

intel xeon gold 6134

intel xeon gold 6134m

intel xeon gold 6136

intel xeon gold 6138

intel xeon gold 6138f

intel xeon gold 6138t

intel xeon gold 6140

intel xeon gold 6140m

intel xeon gold 6142

intel xeon gold 6142f

intel xeon gold 6142m

intel xeon gold 6144

intel xeon gold 6146

intel xeon gold 6148

intel xeon gold 6148f

intel xeon gold 6150

intel xeon gold 6152

intel xeon gold 6154

intel xeon phi 7210

intel xeon phi 7210f

intel xeon phi 7230

intel xeon phi 7230f

intel xeon phi 7235

intel xeon phi 7250

intel xeon phi 7250f

intel xeon phi 7285

intel xeon phi 7290

intel xeon phi 7290f

intel xeon phi 7295

intel xeon platinum 8153

intel xeon platinum 8156

intel xeon platinum 8158

intel xeon platinum 8160

intel xeon platinum 8160f

intel xeon platinum 8160m

intel xeon platinum 8160t

intel xeon platinum 8164

intel xeon platinum 8168

intel xeon platinum 8170

intel xeon platinum 8170m

intel xeon platinum 8176

intel xeon platinum 8176f

intel xeon platinum 8176m

intel xeon platinum 8180

intel xeon silver 4108

intel xeon silver 4109t

intel xeon silver 4110

intel xeon silver 4112

intel xeon silver 4114

intel xeon silver 4114t

intel xeon silver 4116

intel xeon silver 4116t

arm cortex-a 73

arm cortex-a 75

arm cortex-a 9

arm cortex-a 15

arm cortex-a 17

arm cortex-a 57

arm cortex-a 72

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 17.04

canonical ubuntu linux 17.10

canonical ubuntu linux 18.04

netapp hci management node -

netapp solidfire -

netapp hci compute node -

siemens simatic_winac_rtx_\\(f\\)_firmware 2010

debian debian linux 7.0

debian debian linux 8.0

debian debian linux 9.0

oracle communications diameter signaling router 8.0.0

oracle communications diameter signaling router 8.1

oracle communications diameter signaling router 8.2

oracle communications diameter signaling router 8.3

oracle vm virtualbox

Vendor Advisories

Debian Bug report logs - #876414 nvidia-kernel-dkms: security issues CVE-2017-6266, CVE-2017-6267, CVE-2017-6272 Package: nvidia-kernel-dkms; Maintainer for nvidia-kernel-dkms is Debian NVIDIA Maintainers <pkg-nvidia-devel@listsaliothdebianorg>; Source for nvidia-kernel-dkms is src:nvidia-graphics-drivers (PTS, buildd, popcon) ...
Debian Bug report logs - #886852 nvidia-graphics-drivers: CVE-2017-5753/CVE-2017-5715 (spectre), CVE-2017-5754 (meltdown) Package: nvidia-driver; Maintainer for nvidia-driver is Debian NVIDIA Maintainers <pkg-nvidia-devel@listsaliothdebianorg>; Source for nvidia-driver is src:nvidia-graphics-drivers (PTS, buildd, popcon) ...
Debian Bug report logs - #886532 Coming updates for meltdown/spectre Package: qemu; Maintainer for qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Source for qemu is src:qemu (PTS, buildd, popcon) Reported by: Nigel Kukard <nkukard@lbsdnet> Date: Sun, 7 Jan 2018 12:15:02 UTC Severity: grave Fo ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2017-5715 triggers the speculative execution b ...
Several vulnerabilities were discovered in qemu, a fast processor emulator CVE-2017-15038 Tuomas Tynkkynen discovered an information leak in 9pfs CVE-2017-15119 Eric Blake discovered that the NBD server insufficiently restricts large option requests, resulting in denial of service CVE-2017-15124 Daniel Berrange discovered that t ...
This update doesn't fix a vulnerability in linux-tools, but provides support for building Linux kernel modules with the retpoline mitigation for CVE-2017-5715 (Spectre variant 2) This update also includes bug fixes from the upstream Linux 316 stable branch up to and including 31656 For the oldstable distribution (jessie), this problem has been ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2015-9016 Ming Lei reported a race condition in the multiqueue block layer (blk-mq) On a system with a driver using blk-mq (mtip32xx, null_blk, or virtio_blk), a local user might be able ...
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks CVE-2017-5715 Multiple researchers have discovered a vulnerability in various processors supporting speculative execution, enabling an attacker controlling an unprivileged process to read mem ...
Two vulnerabilities were discovered in Libvirt, a virtualisation abstraction library, allowing an API client with read-only permissions to execute arbitrary commands via the virConnectGetDomainCapabilities API, or read or execute arbitrary files via the virDomainSaveImageGetXMLDesc API Additionally the libvirt's cpu map was updated to make address ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2017-5715 triggers the speculative execution b ...
An updated kernel release for Amazon Linux has been made available which prevents speculative execution of indirect branches within the kernel This release incorporates latest stable open source Linux security improvements to address CVE-2017-5715 within the kernel and builds upon previously incorporated Kernel Page Table Isolation (KPTI) that add ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) This variant triggers the speculative execution by utilizing branch target injection It relies on the presence of a precisely-defined instruction sequence in the privilege ...
On January 3, 2018, researchers disclosed three vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks These vulnerabilities could allow an unprivileged local attacker, in specific circumstances, to read pr ...
Speculative execution branch target injectionAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2 ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2017-5715 triggers the speculative execution b ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2017-5715 triggers the speculative execution b ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) There are three primary variants of the issue which differ in the way the speculative execution can be exploited Variant CVE-2017-5715 triggers the speculative execution b ...
An updated kernel release for Amazon Linux has been made available which prevents speculative execution of indirect branches within the kernel This release incorporates latest stable open source Linux security improvements to address CVE-2017-5715 within the kernel and builds upon previously incorporated Kernel Page Table Isolation (KPTI) that add ...
Several security issues were fixed in the Linux kernel ...
Spectre mitigations were added to libvirt ...
Spectre mitigations were added to QEMU ...
Several security issues were fixed in the Linux kernel ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the Linux kernel ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the Linux kernel ...
USN-3531-1 introduced regressions in intel-microcode ...
The system could be made to expose sensitive information ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the Linux kernel ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
WebKitGTK+ could be made to expose sensitive information ...
Several security issues were addressed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
Firefox could be made to expose sensitive information ...
Several security issues were addressed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
An industry-wide vulnerability, known as side channel analysis method, has been disclosed with modern CPUs using speculative execution Speculative execution is an important technique to optimize CPU performance The premise behind speculative execution is that processor instructions are executed before it is determined if these instructions are re ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this upda ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: vdsm security update Type/Severity Security Advisory: Important Topic An update for vdsm is now available for RHEV 4X, RHEV-H, and Agents for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scorin ...
Synopsis Important: linux-firmware security update Type/Severity Security Advisory: Important Topic An update for linux-firmware is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, Red Hat Enterpri ...
Synopsis Important: qemu-kvm-rhev security and bug fix update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 70 (Kilo) for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a sec ...
Synopsis Important: ovirt-guest-agent-docker security and bug fix update Type/Severity Security Advisory: Important Topic An update for ovirt-guest-agent-docker is now available for RHEV 4X, RHEV-H, and Agents for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a securit ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 65 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 65 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabi ...
Synopsis Important: qemu-kvm-rhev security and bug fix update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat Enterprise Linux OpenStack Platform 60 (Juno) for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a sec ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 100 (Newton)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update as havi ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for RHEV 4X, RHEV-H, and Agents for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vu ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabil ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 62 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabi ...
Synopsis Important: kernel-alt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-alt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update as having ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 110 (Ocata)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 59 Long LifeRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 62 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 62 Advanced Update Support, Red Hat Enterprise Linux 64 Advanced Update Support, Red Hat Enterprise Linux ...
Synopsis Important: linux-firmware security update Type/Severity Security Advisory: Important Topic An update for linux-firmware is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnera ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 62 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabi ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base scor ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Servic ...
Synopsis Important: linux-firmware security update Type/Severity Security Advisory: Important Topic An update for linux-firmware is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVS ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 80 (Liberty)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: rhevm-setup-plugins security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for rhevm-setup-plugins is now available for RHEV Manager version 36Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Synopsis Important: rhevm-setup-plugins security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for rhevm-setup-plugins is now available for RHEV Engine version 41Red Hat Product Security has rated this update as having a security impact of Important A Common ...
Synopsis Important: vdsm security update Type/Severity Security Advisory: Important Topic An update for vdsm is now available for RHEV 3X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELSRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for RHEV 3X Hypervisor and Agents for Red Hat Enterprise Linux 7 ELSRed Hat Product Security has rated this update as having a security impact of Important A Com ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP S ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 120 (Pike)Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: microcode_ctl security update Type/Severity Security Advisory: Important Topic An update for microcode_ctl is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabi ...

Exploits

/* EDB Note: - spectreattackcom/ - spectreattackcom/spectrepdf - googleprojectzeroblogspotcoat/2018/01/reading-privileged-memory-with-sidehtml */ #include <stdioh> #include <stdlibh> #include <stdinth> #ifdef _MSC_VER #include <intrinh> /* for rdtscp and clflush */ #pragma optimize("gt",on ...

Github Repositories

A curated list of GitHub projects

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents Assembly Bikeshed C C# C++ CSS Clojure CoffeeScript Common Lisp Crystal Cython D2 Dart Dockerfile Elixir Elm F# FreeMarker Go Groff Groovy HTML Haml Haskell JSON Java JavaScript Jinja Jsonnet Julia Jupyter Notebook Kotlin Lua MATLAB MDX Makefile Markdown Meson NSIS Nextflow Nim Nix Nunjucks OCam

Speculation control powershell script

Overview SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown) For an explanation on how to interpret the output of this tool, please see Understanding Get-SpeculationControlSettings PowerShell

This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs. CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes. These attacks present 3 different ways of attacking data protection measures on CPUs …

In-Spectre-Meltdown This tool allows to check speculative execution side-channel attacks that affect many modern processors and operating systems designs CVE-2017-5754 (Meltdown) and CVE-2017-5715 (Spectre) allows unprivileged processes to steal secrets from privileged processes These attacks present 3 different ways of attacking data protection measures on CPUs enabling atta

A quick-and-dirty tool to verify that userspace executables are immune to Spectre variant 2 (CVE-2017-5715).

retpoline-audit A quick-and-dirty utility to verify that an executable or shared object is using retpolines to mitigate the Spectre vulnerability (Variant 2: branch target injection, CVE-2017-5715) Specifically, retpoline-audit searches for indirect branches in a binary and its shared object dependencies This is currently known to compile on and work with userspace binaries f

Modern computer systems are facing security challenges and thus are forced to employ various encryption, mitigation mechanisms, and other measures that affect significantly their performance. In this study, we aim to identify the energy and run-time performance implications of Meltdown and Spectre mitigation mechanisms.

Efficient_computering_in_safe_environments Research where we try to achieve the most energy savings and run-time performance by turning off unnecessary protection mechanisms of the modern computer systems The idea is that in a protected controlled environment (eg on a non-cloud data center or a single tenant machine) one can get a measurable performance boost by dispensing wi

Overview of TEEP-Device The TEEP Protocol provides the protocol on a wide range of devices for install, update, and delete Trusted Applications and Personalization Data by Trusted Component Signer or Device Administrators who host Trusted Application Managers (TAMs) The TEEP-Device is an implementation for defining the draft of Trusted Execution Environment Provisioning (TEEP

Playbook for system hardening maintained by the #! security research team.

Hardening Playbook Abstract An opinionated minimal-compromises guide to configuring a maximally secure server for high stakes use cases where privacy and security are favored over compatibility, cost, or effeciency This intends to be largely a showcase of the work of others and act as a starting point for researching this space Threat Profile Target protects: Automated air/

Collection of Spectre-type, Meltdown-type and MDS-type PoCs

Collected from existing repos, this repo lists known Spectre-type, Meltdown-type and MDS-type PoCs PRs are welcome If you want to read corresponding codes, please checkout the branch codes git clone -b codes githubcom/morning21/Spectre_Meltdown_MDS_srcsgit ToC: 1 Collection 11 speed47/spectre-meltdown-checker 12 mniip/sp

Introduzione a DuckLoad DuckLoad é uno script in python3 che sfrutta la libreria pyflipper di wh00hw per interagire con il device Flipper Zero La funzione base di DuckLoad é quella di caricare / cancellare payload badusb, ma non solo, le funzioni specifiche vengono spiegate di seguito: -h: Mostra l'healper di DuckLoad -d: Cancella un payload badusb dallo s

Speculation control powershell script

Overview SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown) For an explanation on how to interpret the output of this tool, please see Understanding Get-SpeculationControlSettings PowerShell

Scripting to pull reports from the Red Hat Insights API

insights_reports Scripting to pull reports from the Red Hat Insights API insights_report - Using Insights API, pull active reports (rule hits) Usage: insights_report {credential file} credential_file: YAML file containing attributes RHN_USER and RHN_PASSWORD with the user's customer portal credentials insights_reportold - Using old Insights API, pull active reports (r

A little ps1 script to check if the patches are installed

Meltdown_Spectre_check A little ps1 script to check if the patches are installed This Powershell is for a status check of CVE-2017-5715 (Spectre) & CVE-2017-5754 (Meltdown) on your Windows System You can simply change the output to a nagios plugin or something like that The both module files have to be in the same directory as the ps1 script I have purchased the modu

Spectre and Meltdown in a docker containerized test

docker-spectre A dockerized spectre test environment This image tests for the spectre vulnerability, also known as CVE-2017-5753, CVE-2017-5715 and also on Exploit-DB:43427 Also CVE-2017-5754 aka MeltDown is included here Introductionary reading / TL;DR Original POC used here: Eriks GIST spectre_multiarch: Architecture independent version Deep learning side channel privil

My starred repositories

Awesome Stars A curated list of my GitHub stars! Generated by stargazed 🏠 Contents ANTLR (1) ActionScript (1) Assembly (6) AutoHotkey (1) AutoIt (1) Awk (2) Batchfile (6) C (153) C# (56) C++ (164) CMake (3) CSS (108) Clojure (6) CoffeeScript (9) Common Lisp (1) Crystal (1) Dart (84) Dockerfile (7) EJS (2) Elixir (5) Elm (1) Emacs Lisp (12) Erlang (2) FreeMarker (1) Ghe

The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715).

spectreScope The demo of the speculative execution attack Spectre (CVE-2017-5753, CVE-2017-5715) Tested On macOS Intel - Apple MacBook Pro Retina, 15-inch, Late 2013 - macOS High Sierra 10132 - 1 Intel(R) Core(TM) i7-4750HQ CPU @ 200GHz - git 2143 - cmake 3101 - Xcode 92 Linux Intel

Minimal tool for measuring cost of mode switch

CPU mode switch statistics The mode-switch-stat tool measures the cost of CPU mode switch, the round trip between user and kernel mode At present, this tool supports x86_64 and aarch64 (ARMv8) architectures, and it would be useful to understand the performance impact to defense against Meltdown and Spectre vulnerability Background: Meltdown and Spectre In operating systems su

Proof of Concept - Spectre

Spectre - Proof of Concept What is Spectre and Meltdown? Meltdown and Spectre exploit critical vulnerabilities in modern processors These hardware vulnerabilities allow programs to steal data which is currently processed on the computer While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hol

Meltdown & Spectre Meltdown and Spectre are the names given to different variants of the same fundamental underlying vulnerability that affects nearly every computer chip manufactured in the last two decades[1] If exploited, these vulnerabilities allow attackers to get access to data previously considered completely protected Security researchers discovered the flaws

2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用

Spectre 攻击例程 2018年1月2日 (CVE-2017-5753 和 CVE-2017-5715) "幽灵" Spectre 漏洞利用例子 这是什么? 我们把文本 "The Magic Words are Squeamish Ossifrage" 放在内存中, 然后我们试图利用漏洞读取他。如果系统易受到攻击, 那么你将在标准输出中看到相同的文本。 在本代码中, 如果 victim_fun

yum update for centos

ansible-role-server-update-reboot Ansible role to update server to latest packages, reboot server, and wait for the server to start up Add more roles after this to continue installing/configuring server Can also exclude packages from being updated, only update specified packages, or install specified packages Works with Redhat/CentOS and Ubuntu Can be used to update package

Installs the Node Exporter for Prometheus

prometheus-node-exporter Deploys the Node Exporter for Prometheus Requirements None Role Variables Variable Required Default Choices Comments PROMETHEUS_NODE_EXPORTER_MONITOR_RAID_STORCLI no false true, false Monitor RAID with StorCLI PROMETHEUS_NODE_EXPORTER_CHECK_SPECTRE_MELTDOWN no false true, false Check Spectre/Meltdown mitigation status PROMETHEUS_NODE_EXPOR

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Deep learning side channel privileged memory reader

Deep Spectre Deep Spectre is a deep learning side channel privileged memory reader heavily based on the PoC found here I've written a Medium post explaining the deep learning code and you can read more about Spectre in CVE-2017-5753 and CVE-2017-5715 or check out the whitepaper and Google Project Zero post Installing The Python 3 C API is used to glue the PoC code to th

A POC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715)

CiscoSpectreTakeover A PoC chain exploit using the recent Cisco SMP exploit (CVE-2017-6736) to chain into Spectre (CVE-2017-5753 and CVE-2017-5715) Credits Cisco RCE Exploit submodule by artkond: githubcom/artkond/cisco-snmp-rce JS Spectre Chrome POC by ascendr: githubcom/ascendr/spectre-chrome Tested on a Cisco 1841+2600 Router After running the RCE exploit

Docs and resources on CPU Speculative Execution bugs

CPU security bugs caused by speculative execution This repo is an attempt to collect information on the class of information disclosure vulnerabilities caused by CPU speculative execution that were disclosed on January 3rd, 2018 Existing nomenclature is inconsistent and there is no agreed-upon name for the entire class of bugs, but the names Spectre and Meltdown have been used

One selfmodify code, that can affect cache. I haven't figured out how to use it yet.

selfModify One selfmodify code, that can affect cache I haven't figured out how to use it yet Inspired by CVE-2017-5753 and CVE-2017-5715 (as known as Spectre)

Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Update server (Redhat/CentOS or Ubuntu) to latest packages, reboot server, and wait for the server to start up.

ansible-role-server-update-reboot Ansible role to update server to latest packages, reboot server, and wait for the server to start up Add more roles after this to continue installing/configuring server Can also exclude packages from being updated, only update specified packages, or install specified packages Works with Redhat/CentOS and Ubuntu Can be used to update package

Summary of the patch status for Meltdown / Spectre

meltdownspectre-patches Summary of the patch status for Meltdown / Spectre What? Meltdown and Spectre are hardware design vulnerabilities in all modern CPUs based on speculative execution Background infos: spectreattackcom/ or meltdownattackcom/ (both pages serve identical content) googleprojectzeroblogspotdk/2018/01/reading-privileged-memory-with-

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Query mitigation status of Meltdown and Spectre against one or multiple Windows computers. It uses parallelization for fast data collection.

*Note: This project is currently not maintained Mitigation status for CVE-2017-5753 in IE or Edge is not properly displayed, if you installed the recent Windows updates MeltdownSpectreReport lacks also of report of newer speculative execution vulnerabilities like L1TF Microsoft updated their SpeculationControl module, which I recommend to use * MeltdownSpectreReport Query m

ansible-role-server-update-reboot Ansible role to update server to latest packages, reboot server, and wait for the server to start up Add more roles after this to continue installing/configuring server Can also exclude packages from being updated, only update specified packages, or install specified packages Works with Redhat/CentOS and Ubuntu Can be used to update package

Meltdown & Spectre Meltdown and Spectre are the names given to different variants of the same fundamental underlying vulnerability that affects nearly every computer chip manufactured in the last two decades[1] If exploited, these vulnerabilities allow attackers to get access to data previously considered completely protected Security researchers discovered the flaws

spectre attack v1.2

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

spectre attack v1.1

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Meltdown & Spectre Meltdown and Spectre are the names given to different variants of the same fundamental underlying vulnerability that affects nearly every computer chip manufactured in the last two decades[1] If exploited, these vulnerabilities allow attackers to get access to data previously considered completely protected Security researchers discovered the flaws

Assesses a system for the "speculative execution" vulnerabilities described in CVE-2017-5715, CVE-2017-5753, CVE-2017-5754

SpeculativeExecutionAssessment Assesses a system for the "speculative execution" vulnerabilities described in: CVE-2017-5715 (branch target injection) CVE-2017-5753 (bounds check bypass) CVE-2017-5754 (rogue data cache load) WARNING: Ensure that "Prefer 32-bit" is not checked in the build options Requires elevated permissions Mitigiation requires: Set the

Spectre and Meltdown security patch management

Spectre and Meltdown security patch management This repository uses Ansible playbooks to view and enable or disable flags that address security vulnerabilities CVE-2017-5754 CVE-2017-5715 and CVE-2017-5753 in specific Red Hat Linux versions Red Hat has created updated kernels available to address these security vulnerabilities These patches are enabled by default, to provide

Checking tools to detect Spectre or Meltdown vulnerabilities

Spectre-Meltdown-Checker Spectre-Meltdown-Checker is currently a Windows utility for checking the state of the software mitigations against CVE-2017-5754 (Meltdown) and hardware mitigations against CVE-2017-5715 (Spectre) It uses two new information classes that were added to the NtQuerySystemInformation API call as part of the recent patches introduced in January 2018 and rep

Proof of Concept - Spectre

Spectre - Proof of Concept What is Spectre and Meltdown? Meltdown and Spectre exploit critical vulnerabilities in modern processors These hardware vulnerabilities allow programs to steal data which is currently processed on the computer While programs are typically not permitted to read data from other programs, a malicious program can exploit Meltdown and Spectre to get hol

Meltdown & Spectre - catastrophic vulnerabilities - exploited 🛡️

Meltdown & Spectre Meltdown and Spectre are the names given to different variants of the same fundamental underlying vulnerability that affects nearly every computer chip manufactured in the last two decades[1] If exploited, these vulnerabilities allow attackers to get access to data previously considered completely protected Security researchers discovered the flaws

Security-related code includes but is not limited to PoCs of existing CVEs, side-channel investigations, etc.

This repository includes security-related code, including but not being limited to PoCs of existing CVEs, side-channel investigations, etc Some Intel SGX related vunlerabilities are also included Up-to-date contents of this repository is listed as follows: Name CVE PoC language PoC architecture OS Spectre Attack CVE-2017-5753, CVE-2017-5715 C Intel x86 Linux PwnKit C

spectre_meltdown Description Disable Spectre And Meltdown kernel patches (CVE-2017-5754, CVE-2017-5715, CVE-2018-3639) by adding "nopti", "spectre_v2=off" and "spec_store_bypass_disable=off" to kernel command line for grub Adds facts: meltdown spectre_v1 spectre_v2 ibpb_enabled ibrs_enabled pti_enabled cpu_microcode l1tf retp_enabled spec_store_

a list of BIOS/Firmware fixes adressing CVE-2017-5715, CVE-2017-5753, CVE-2017-5754

Meltdown/Spectre BIOS/Firmware Updates list This is a list of all products an manufacturers which patched BIOS/Firmware addressing the Meltdown and Spectre vulnerabilities If you have better info please send pull requests Why I did this? to have a parseable list for all my hardware Check your mainboard linux curl -s rawgithubusercontentcom/mathse/meltdown-spectre-bio

Spectre Attack Example Example of using revealed "Spectre" exploit from 2 Jan 2018 (CVE-2017-5753 and CVE-2017-5715) Spectre breaks the isolation between different applications It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets In fact, the safety checks of said best practices actually increase the attack surf

Awesome List of my own!

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents AGS Script ASL ActionScript Ada Agda Arc Arduino Assembly Awk Batchfile Bikeshed Bluespec Brainfuck C C# C++ CMake CSS Chapel Cirru Clojure CoffeeScript Common Lisp Coq Crystal Cuda Cython D Dart Dockerfile Eagle Earthly Elixir Elm Emacs Lisp Erlang F# F* Fennel Forth Fortran Frege G-code GLSL G

Recent Articles

Too bad, so sad, exploit devs: Google patches possibly several million dollars' worth of security flaws in Android
The Register • Shaun Nichols in San Francisco • 05 Sep 2019

Except one – a 'your phone is now my phone' bug reported months ago and still not fixed Fancy buying a compact and bijou cardboard box home in a San Francisco alley? This $2.5m Android bounty will get you nearly there

Google this week emitted the September edition of its monthly Android security updates – and has left at least one known vulnerability unpatched. Also, in case you missed it, the web giant started rolling out Android 10 a few days ago. The September 2019 bundle of security fixes will be pushed out automatically to Google-branded devices, while those with other Android gear will be fed the fixes by their device manufacturer or mobile carrier. Some of the holes can be patched remotely by the ad ...

Kaspersky Security Bulletin 2018. Top security stories
Securelist • David Emm Victor Chebyshev • 03 Dec 2018

The internet is now woven into the fabric of our lives. Many people routinely bank, shop and socialize online and the internet is the lifeblood of commercial organizations. The dependence on technology of governments, businesses and consumers provides a broad attack surface for attackers with all kinds of motives – financial theft, theft of data, disruption, damage, reputational damage or simply ‘for the lulz’. The result is a threat landscape that ranges from highly sophisticated targeted...

Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole
The Register • Chris Williams, Editor in Chief • 21 May 2018

Design blunder exists in Intel, AMD, Arm, Power processors Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign We need to go deeper: Meltdown and Spectre flaws will force security further down the stack

A fourth variant of the data-leaking Meltdown-Spectre security flaws in modern processors has been found by Microsoft and Google researchers. These speculative-execution design blunders can be potentially exploited by malicious software running on a vulnerable device or computer, or a miscreant logged into the system, to slowly extract secrets, such as passwords, from protected kernel or application memory, depending on the circumstances. Variants 1 and 2 are known as Spectre (CVE-2017-5753, CVE...

IT threat evolution Q1 2018
Securelist • David Emm • 14 May 2018

In January, we uncovered a sophisticated mobile implant that provides attackers with remote control of infected Android devices.  The malware, called Skygofree (after one of the domains it uses), is a targeted cyber-surveillance tool that has been in development since 2014.  The malware is spread by means of spoofed web pages that mimic leading mobile providers.  The campaign is ongoing and our telemetry indicates that there have been several victims, all in Italy.  We feel confident that th...

Microsoft works weekends to kill Intel's shoddy Spectre patch
The Register • Richard Chirgwin • 29 Jan 2018

Out-of-band patch may assuage user anger over Intel crudware, closed-club disclosure process

Microsoft has implemented Intel's advice to reverse the chipmaker's Spectre variant 2 microcode patches. Redmond issued a rare weekend out-of-cycle advisory on Saturday here, to make the unwind possible. Intel's first patch was so bad, it made many computers less stable, sending Linux kernel supremo Linus Torvalds into a justifiable meltdown last week. Chipzilla later withdrew the patch, but it had made its way into a Microsoft fix, which the Windows giant pulled on Saturday. “Our own experien...

Now Meltdown patches are making industrial control systems lurch
The Register • John Leyden • 15 Jan 2018

Automation and SCADA-flingers admit fix has affected products

Patches for the Meltdown vulnerability are causing stability issues in industrial control systems. SCADA vendor Wonderware admitted that Redmond's Meltdown patch made its Historian product wobble. "Microsoft update KB4056896 (or parallel patches for other Operating System) causes instability for Wonderware Historian and the inability to access DA/OI Servers through the SMC," an advisory on Wonderware's support site explains. Rockwell Automation revealed that the same patch had caused issues with...

More stuff broken amid Microsoft's efforts to fix Meltdown/Spectre vulns
The Register • John Leyden • 08 Jan 2018

This is going to take a while Microsoft patches Windows to cool off Intel's Meltdown – wait, antivirus? Slow your roll

More examples have emerged of security fixes for the Meltdown vulnerability breaking things. Patching against CVE-2017-5753 and CVE-2017-5715 (Spectre) and CVE-2017-5754 (Meltdown) borks both the PulseSecure VPN client and Sandboxie, the sandbox-based isolation program developed by Sophos. PulseSecure has come up with a workaround for affected platforms, which include Windows 10 and Windows 8.1 but not Windows 7. Sandboxie has released an updated client to solve compatibility issues with an emer...

Qualcomm joins Intel, Apple, Arm, AMD in confirming its CPUs suffer hack bugs, too
The Register • Shaun Nichols in San Francisco • 06 Jan 2018

Just in time for Friday night

Qualcomm has confirmed its processors have the same security vulnerabilities disclosed this week in Intel, Arm, AMD and IBM CPU cores. The California tech giant picked the favored Friday US West Coast afternoon "news dump" slot to admit at least some of its billions of Arm-compatible Snapdragon system-on-chips and newly released Centriq server-grade processors are subject to the Meltdown and/or Spectre data-theft bugs. "Qualcomm Technologies, Inc is aware of the security research on industry-wid...

Microsoft patches Windows to cool off Intel's Meltdown – wait, antivirus? Slow your roll
The Register • Shaun Nichols in San Francisco • 04 Jan 2018

Check your anti-malware tool unless you like BSoDs

Microsoft has released updates for Windows to block attempts by hackers and malware to exploit the Meltdown vulnerability in Intel x86-64 processors – but you will want to check your antivirus software before applying the fixes. The Redmond giant issued the out-of-band update late yesterday for Windows 10 version 1709. While the documentation for the fix does not name Chipzilla's CPU-level vulnerability specifically, a Microsoft spokesman told El Reg it will hopefully protect Windows users fro...

References

CWE-203https://www.synology.com/support/security/Synology_SA_18_01https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/https://support.lenovo.com/us/en/solutions/LEN-18282https://support.f5.com/csp/article/K91229003https://spectreattack.com/https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-frhttps://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.htmlhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.htmlhttps://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/https://access.redhat.com/security/vulnerabilities/speculativeexecutionhttp://xenbits.xen.org/xsa/advisory-254.htmlhttp://www.securitytracker.com/id/1040071http://www.kb.cert.org/vuls/id/584653http://nvidia.custhelp.com/app/answers/detail/a_id/4609https://www.vmware.com/us/security/advisories/VMSA-2018-0002.htmlhttps://www.exploit-db.com/exploits/43427/https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannelhttps://support.citrix.com/article/CTX231399https://security.netapp.com/advisory/ntap-20180104-0001/http://www.securityfocus.com/bid/102376http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.htmlhttp://nvidia.custhelp.com/app/answers/detail/a_id/4614http://nvidia.custhelp.com/app/answers/detail/a_id/4613http://nvidia.custhelp.com/app/answers/detail/a_id/4611http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.htmlhttp://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.htmlhttps://www.vmware.com/us/security/advisories/VMSA-2018-0004.htmlhttps://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_ushttps://usn.ubuntu.com/usn/usn-3516-1/http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.htmlhttps://access.redhat.com/errata/RHSA-2018:0292https://www.debian.org/security/2018/dsa-4120http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txthttps://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.aschttps://usn.ubuntu.com/3597-2/https://usn.ubuntu.com/3597-1/https://usn.ubuntu.com/3594-1/https://usn.ubuntu.com/3582-2/https://usn.ubuntu.com/3582-1/https://usn.ubuntu.com/3581-2/https://usn.ubuntu.com/3581-1/https://usn.ubuntu.com/3580-1/https://usn.ubuntu.com/3561-1/https://usn.ubuntu.com/3560-1/https://usn.ubuntu.com/3549-1/https://usn.ubuntu.com/3531-1/https://usn.ubuntu.com/3542-2/https://www.vmware.com/security/advisories/VMSA-2018-0007.htmlhttps://usn.ubuntu.com/3541-2/https://usn.ubuntu.com/3540-2/https://usn.ubuntu.com/3531-3/https://usn.ubuntu.com/3620-2/https://www.debian.org/security/2018/dsa-4188https://www.debian.org/security/2018/dsa-4187https://lists.debian.org/debian-lts-announce/2018/05/msg00000.htmlhttps://cert.vde.com/en-us/advisories/vde-2018-003https://cert.vde.com/en-us/advisories/vde-2018-002https://www.kb.cert.org/vuls/id/180049https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityhttps://www.debian.org/security/2018/dsa-4213https://usn.ubuntu.com/3690-1/https://lists.debian.org/debian-lts-announce/2018/07/msg00016.htmlhttps://lists.debian.org/debian-lts-announce/2018/07/msg00015.htmlhttp://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_ushttps://lists.debian.org/debian-lts-announce/2018/09/msg00007.htmlhttps://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.htmlhttps://usn.ubuntu.com/3777-3/https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001https://security.gentoo.org/glsa/201810-06https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixeshttps://seclists.org/bugtraq/2019/Jun/36http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txthttps://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfhttps://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.aschttps://seclists.org/bugtraq/2019/Nov/16http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.htmlhttps://security.paloaltonetworks.com/CVE-2017-5715https://lists.debian.org/debian-lts-announce/2020/03/msg00025.htmlhttps://lists.debian.org/debian-lts-announce/2021/08/msg00019.htmlhttps://nvd.nist.govhttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=876414https://www.exploit-db.com/exploits/43427/https://www.kb.cert.org/vuls/id/584653