5.6
CVSSv3

CVE-2018-3646

Published: 14/08/2018 Updated: 07/11/2023
CVSS v2 Base Score: 4.7 | Impact Score: 6.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 5.6 | Impact Score: 4 | Exploitability Score: 1.1
VMScore: 420
Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N

Vulnerability Summary

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel core i3 4330

intel core i3 4330t

intel core i3 4330te

intel core i3 4340

intel core i3 4340te

intel core i3 4350

intel core i3 4350t

intel core i3 4360

intel core i3 4360t

intel core i3 4370

intel core i3 4370t

intel core i3 4100e

intel core i3 4100m

intel core i3 4100u

intel core i3 4102e

intel core i3 4110e

intel core i3 4110m

intel core i3 4112e

intel core i3 4120u

intel core i3 4158u

intel core i3 4170t

intel core i3 4170

intel core i3 4160t

intel core i3 4160

intel core i3 4150t

intel core i3 4150

intel core i3 4130t

intel core i3 4130

intel core i3 4000m

intel core i3 4005u

intel core i3 4010u

intel core i3 4010y

intel core i3 4012y

intel core i3 4020y

intel core i3 4025u

intel core i3 4030u

intel core i3 4030y

intel core i3 8100

intel core i3 8350k

intel core i3 6300

intel core i3 6300t

intel core i3 6320

intel core i3 6100e

intel core i3 6100h

intel core i3 6100u

intel core i3 6102e

intel core i3 6157u

intel core i3 6167u

intel core i3 6100

intel core i3 6100t

intel core i3 6100te

intel core i3 6006u

intel core i3 6098p

intel core i3 5157u

intel core i3 5020u

intel core i3 5015u

intel core i3 5010u

intel core i3 5005u

intel core i3 3250t

intel core i3 3250

intel core i3 3245

intel core i3 3240t

intel core i3 3240

intel core i3 3229y

intel core i3 3227u

intel core i3 3225

intel core i3 3220t

intel core i3 3220

intel core i3 3217ue

intel core i3 3217u

intel core i3 3210

intel core i3 3130m

intel core i3 3120me

intel core i3 3120m

intel core i3 3115c

intel core i3 3110m

intel core i3 2377m

intel core i3 2375m

intel core i3 2370m

intel core i3 2367m

intel core i3 2365m

intel core i3 2357m

intel core i3 2350m

intel core i3 2348m

intel core i3 2340ue

intel core i3 2330m

intel core i3 2330e

intel core i3 2328m

intel core i3 2312m

intel core i3 2310m

intel core i3 2310e

intel core i3 2130

intel core i3 2125

intel core i3 2120t

intel core i3 2120

intel core i3 2115c

intel core i3 2105

intel core i3 2102

intel core i3 2100t

intel core i3 2100

intel core i3 560

intel core i3 390m

intel core i3 550

intel core i3 540

intel core i3 530

intel core i3 380um

intel core i3 380m

intel core i3 370m

intel core i3 350m

intel core i3 330um

intel core i3 330m

intel core i3 330e

intel core i5 4670

intel core i5 4670k

intel core i5 4670r

intel core i5 4670s

intel core i5 4670t

intel core i5 4690

intel core i5 4690k

intel core i5 4690s

intel core i5 4690t

intel core i5 4570

intel core i5 4570r

intel core i5 4570s

intel core i5 4570t

intel core i5 4570te

intel core i5 4590

intel core i5 4590s

intel core i5 4590t

intel core i5 4422e

intel core i5 4410e

intel core i5 4402ec

intel core i5 4402e

intel core i5 4400e

intel core i5 4460t

intel core i5 4460s

intel core i5 4460

intel core i5 4440s

intel core i5 4440

intel core i5 4430s

intel core i5 4430

intel core i5 4300m

intel core i5 4300u

intel core i5 4300y

intel core i5 4302y

intel core i5 4308u

intel core i5 4310m

intel core i5 4310u

intel core i5 4330m

intel core i5 4340m

intel core i5 4350u

intel core i5 4360u

intel core i5 4200h

intel core i5 4200m

intel core i5 4200u

intel core i5 4200y

intel core i5 4202y

intel core i5 4210h

intel core i5 4210m

intel core i5 4210u

intel core i5 4210y

intel core i5 4220y

intel core i5 4250u

intel core i5 4258u

intel core i5 4260u

intel core i5 4278u

intel core i5 4288u

intel core i5 8350u

intel core i5 8250u

intel core i5 8400

intel core i5 8600k

intel core i5 6600

intel core i5 6685r

intel core i5 6600k

intel core i5 6600t

intel core i5 6585r

intel core i5 6500

intel core i5 6500t

intel core i5 6500te

intel core i5 6402p

intel core i5 6400

intel core i5 6400t

intel core i5 6440eq

intel core i5 6440hq

intel core i5 6442eq

intel core i5 6360u

intel core i5 6350hq

intel core i5 6300hq

intel core i5 6300u

intel core i5 6200u

intel core i5 6260u

intel core i5 6267u

intel core i5 6287u

intel core i5 5675r

intel core i5 5675c

intel core i5 5575r

intel core i5 5350u

intel core i5 5350h

intel core i5 5300u

intel core i5 5287u

intel core i5 5257u

intel core i5 5250u

intel core i5 5200u

intel core i5 3610me

intel core i5 3570s

intel core i5 3570t

intel core i5 3570k

intel core i5 3570

intel core i5 3550s

intel core i5 3550

intel core i5 3475s

intel core i5 3470t

intel core i5 3470s

intel core i5 3470

intel core i5 3450s

intel core i5 3450

intel core i5 3439y

intel core i5 3437u

intel core i5 3427u

intel core i5 3380m

intel core i5 3360m

intel core i5 3350p

intel core i5 3340s

intel core i5 3340m

intel core i5 3340

intel core i5 3339y

intel core i5 3337u

intel core i5 3330s

intel core i5 3330

intel core i5 3320m

intel core i5 3210m

intel core i5 3317u

intel core i5 3230m

intel core i5 2557m

intel core i5 2550k

intel core i5 2540m

intel core i5 2537m

intel core i5 2520m

intel core i5 2515e

intel core i5 2510e

intel core i5 2500t

intel core i5 2500s

intel core i5 2500k

intel core i5 2500

intel core i5 2467m

intel core i5 2450p

intel core i5 2450m

intel core i5 2435m

intel core i5 2430m

intel core i5 2410m

intel core i5 2405s

intel core i5 2400s

intel core i5 2400

intel core i5 2390t

intel core i5 2380p

intel core i5 2320

intel core i5 2310

intel core i5 2300

intel core i5 680

intel core i5 480m

intel core i5 760

intel core i5 750s

intel core i5 750

intel core i5 670

intel core i5 661

intel core i5 660

intel core i5 655k

intel core i5 650

intel core i5 580m

intel core i5 560um

intel core i5 560m

intel core i5 540um

intel core i5 540m

intel core i5 520um

intel core i5 520m

intel core i5 520e

intel core i5 470um

intel core i5 460m

intel core i5 450m

intel core i5 430um

intel core i5 430m

intel core i7 4900mq

intel core i7 4910mq

intel core i7 4950hq

intel core i7 4960hq

intel core i7 4980hq

intel core i7 4800mq

intel core i7 4810mq

intel core i7 4850hq

intel core i7 4860hq

intel core i7 4870hq

intel core i7 4700ec

intel core i7 4700eq

intel core i7 4700hq

intel core i7 4700mq

intel core i7 4702ec

intel core i7 4702hq

intel core i7 4702mq

intel core i7 4710hq

intel core i7 4710mq

intel core i7 4712hq

intel core i7 4712mq

intel core i7 4720hq

intel core i7 4722hq

intel core i7 4750hq

intel core i7 4760hq

intel core i7 4770hq

intel core i7 4790k

intel core i7 4770k

intel core i7 4765t

intel core i7 4770

intel core i7 4770r

intel core i7 4770s

intel core i7 4770t

intel core i7 4770te

intel core i7 4771

intel core i7 4785t

intel core i7 4790

intel core i7 4790s

intel core i7 4790t

intel core i7 4600m

intel core i7 4600u

intel core i7 4610m

intel core i7 4610y

intel core i7 4650u

intel core i7 4500u

intel core i7 4510u

intel core i7 4550u

intel core i7 4558u

intel core i7 4578u

intel core i7 8550u

intel core i7 8650u

intel core i7 8700

intel core i7 8700k

intel core i7 7920hq

intel core i7 7820hq

intel core i7 7820hk

intel core i7 7820eq

intel core i7 7700hq

intel core i7 7700

intel core i7 7700k

intel core i7 7700t

intel core i7 7660u

intel core i7 7600u

intel core i7 7567u

intel core i7 7560u

intel core i7 7500u

intel core i7 7y75

intel core i7 5950hq

intel core i7 5850hq

intel core i7 5850eq

intel core i7 5750hq

intel core i7 5700eq

intel core i7 5700hq

intel core i7 5775r

intel core i7 5775c

intel core i7 5650u

intel core i7 5600u

intel core i7 5557u

intel core i7 5550u

intel core i7 5500u

intel core i7 2960xm

intel core i7 2920xm

intel core i7 990x

intel core i7 980x

intel core i7 975

intel core i7 965

intel core i7 940xm

intel core i7 920xm

intel core i7 3840qm

intel core i7 3820qm

intel core i7 3770t

intel core i7 3770s

intel core i7 3770k

intel core i7 3770

intel core i7 3740qm

intel core i7 3720qm

intel core i7 3689y

intel core i7 3687u

intel core i7 3667u

intel core i7 3635qm

intel core i7 3632qm

intel core i7 3630qm

intel core i7 3615qm

intel core i7 3615qe

intel core i7 3612qm

intel core i7 3612qe

intel core i7 3610qm

intel core i7 3610qe

intel core i7 3555le

intel core i7 3540m

intel core i7 3537u

intel core i7 3520m

intel core i7 3517ue

intel core i7 3517u

intel core i7 2860qm

intel core i7 2820qm

intel core i7 2760qm

intel core i7 2720qm

intel core i7 2715qe

intel core i7 2710qe

intel core i7 2700k

intel core i7 2677m

intel core i7 2670qm

intel core i7 2675qm

intel core i7 2657m

intel core i7 2655le

intel core i7 2649m

intel core i7 2640m

intel core i7 2637m

intel core i7 2635qm

intel core i7 2630qm

intel core i7 2629m

intel core i7 2620m

intel core i7 2617m

intel core i7 2610ue

intel core i7 2600s

intel core i7 2600k

intel core i7 2600

intel core i7 920

intel core i7 860

intel core i7 820qm

intel core i7 720qm

intel core i7 610e

intel core i7 980

intel core i7 970

intel core i7 960

intel core i7 950

intel core i7 940

intel core i7 930

intel core i7 880

intel core i7 875k

intel core i7 870s

intel core i7 870

intel core i7 860s

intel core i7 840qm

intel core i7 740qm

intel core i7 680um

intel core i7 660um

intel core i7 660ue

intel core i7 660lm

intel core i7 640um

intel core i7 640m

intel core i7 640lm

intel core i7 620um

intel core i7 620ue

intel core i7 620m

intel core i7 620lm

intel core i7 620le

intel core m 5y71

intel core m 5y70

intel core m 5y51

intel core m 5y31

intel core m 5y10c

intel core m 5y10a

intel core m 5y10

intel core m3 7y32

intel core m3 7y30

intel core m3 6y30

intel core m5 6y54

intel core m5 6y57

intel core m7 6y75

intel xeon

Vendor Advisories

This update provides mitigations for the L1 Terminal Fault vulnerability affecting a range of Intel CPUs For additional information please refer to xenbitsxenorg/xsa/advisory-273html The microcode updates mentioned there are not yet available in a form distributable by Debian In addition two denial of service vulnerabilities have been ...
Multiple researchers have discovered a vulnerability in the way the Intel processor designs have implemented speculative execution of instructions in combination with handling of page-faults This flaw could allow an attacker controlling an unprivileged process to read memory from arbitrary (non-user controlled) addresses, including from the kernel ...
Fixes for L1Terminal Fault security issues: L1 Terminal Fault-OS/ SMM:Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis(CVE-2018-3620) L1 Termin ...
Fixes for L1Terminal Fault security issues: L1 Terminal Fault-OS/ SMM:Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and side-channel analysis(CVE-2018-3620) L1 Termin ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 59 Long LifeRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP Sol ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: rhvm-appliance security update Type/Severity Security Advisory: Important Topic An update for rhvm-appliance is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vuln ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 65 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise MRG 2Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVS ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 66 Advanced Update Support and Red Hat Enterprise Linux 66 Telco Extended Update SupportRed Hat Product Security has rated this update as having a ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: rhev-hypervisor7 security update Type/Severity Security Advisory: Important Topic An update for rhev-hypervisor7 is now available for RHEV 3X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7 ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: redhat-virtualization-host security update Type/Severity Security Advisory: Important Topic An update for redhat-release-virtualization-host and redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this ...
Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimizati ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
The system could be made to expose sensitive information ...
Several security issues were fixed in the Linux kernel ...
Several security issues were mitigated in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
USN-3742-2 introduced regressions in the Linux Hardware Enablement (HWE) kernel for Ubuntu 1204 ESM ...
5On August 14th, 2018, three vulnerabilities were disclosed by Intel and security researchers that leverage a speculative execution side-channel method referred to as L1 Terminal Fault (L1TF) that affects modern Intel microprocessors These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privileged me ...
Systems with microprocessors utilising speculative execution and address translations may allow unauthorised disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis ...
A new speculative execution side channel variant has been discovered called L1 Terminal Fault (L1TF) There are no reports that L1TF has been used in real world exploits This currently affects select Intel processors Mitigations will require microcode updates released earlier this year, plus operating system and hypervisor software updates ...
A new speculative execution side channel variant has been discovered called L1 Terminal Fault (L1TF) There are no reports that L1TF has been used in real world exploits This currently affects select Intel processors Mitigations will require microcode updates released earlier this year, plus operating system and hypervisor software updates ...
Description of Problem Several security issues have been identified that impact XenServer Customers should consider these issues and determine possible impact to their own systems  These updates provide a mitigation for recently disclosed issues affecting Intel CPUs  These issues, if exploited, could allow malicious unprivileged code i ...
Intel and security researchers publicly disclosed three new cpu side-channel vulnerabilities (CVE-2018-3615, CVE-2018-3620 and CVE-2018-3646) Successful exploit of these vulnerabilities could allow a local attacker to read the memory of other processes in specific situations These vulnerabilities are named by researchers as "Foreshadow" and ...
PAN-SA-2018-0011 Information about L1 Terminal Fault findings ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 1014 <!--X-Subject-Header-End--> < ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2018-10-30-2 macOS Mojave 10141, Security Update 2018-001 High Sierra, Security Update 2018-005 Sierra <!-- ...

Github Repositories

L1TF (Foreshadow) VM guest to host memory read PoC

L1TF (Foreshadow) VM guest to host memory read PoC This is a PoC for CVE-2018-3646 This is a vulnerability that enables malicious/compromised VM guests to read host machine physical memory The vulnerability is exploitable on most Intel CPUs that support VT-x and EPT (extended page tables) This includes all Intel Core iX CPUs This PoC works only on 64 bit x86-64 systems (hos

Network research report Details 2020 Fall, Undergraduate Research Project @SKKU SRIOV setup How to setup? Configure the number of VMs $ echo 4 &gt; /sys/class/net/&lt;device name&gt;/device/sriov_numvfs check businfo with $ lshw -c network -businfo create ip for machine, if needed

r151019 r151019 / Mar20 Date Subject Commit 20Mar2014 OS-2834 ship lx brand e8facfd99e91cf5fefa4291a3ba0b6a0710eea09 r151019 / Jun08 Date Subject Commit 20Mar2014 OS-2836 lx brand installer hardcodes /usr/sfw/bin/gtar ea8e5e6536094a59f04195b1aa255e96ac1bbc44 28Mar2014 OS-2863 lx brand need finer grained control over version 75c15d410d1e0a2763da7339ed8f40732c3

An demonstrator for the L1TF/Foreshadow vulnerability

Overview This is a proof-of-concept self-contained L1TF demonstrator that works in the presence of the Linux kernel's default L1TF mitigation This code does by design not work on a vanilla Linux kernel The purpose is to help validate and improve defenses and not build a practical attack The Linux Kernel User's and Administrator's Guide describes two attack sce

== Mis en place et Patch de sécurité Vmware ESXi 67 Professionnel Plus == Préambule projet : Bonjour à tous, après pas mal de test sur Vmware ES Xi 67 et 70 j'ai pu voir quelques anomalies mais dans l'ensemble il s'agit d'un très bon hyperviseur quand ton effectue quelque prérogative, notamment sur la versi

Arch Linux Installation Create a bootable Arch Linux USB Skip to the next section, because the creation of an UEFI bootable Arch Linux USB drive had been already automated: see githubcom/kyberdrb/arch_linux_bootable_uefi_usb_creator Download Arch Linux ISO The latest version I tested to boot successfuly was the archlinux-20210201-x86_64iso The newer ones failed

Recent Articles

Foreshadow and Intel SGX software attestation: 'The whole trust model collapses'
The Register • Richard Chirgwin • 15 Aug 2018

El Reg talks to Dr Yuval Yarom about Intel's memory leaking catastrophe Three more data-leaking security holes found in Intel chips as designers swap security for speed

Interview In the wake of yet another collection of Intel bugs, The Register had the chance to speak to Foreshadow co-discoverer and University of Adelaide and Data61 researcher Dr Yuval Yarom about its impact. Dr Yarom explained that one of the big impacts of Foreshadow is that it destroys an important trust model – SGX attestations, which guarantee that the code you publish is the code someone else is running. Think of it as tamper-evident packaging for software: having published your softwar...

Three more data-leaking security holes found in Intel chips as designers swap security for speed
The Register • Chris Williams, Editor in Chief • 14 Aug 2018

Apps, kernels, virtual machines, SGX, SMM at risk from attack Another data-leaking Spectre CPU flaw among Intel's dirty dozen of security bug alerts today

Intel will today disclose three more vulnerabilities in its processors that can be exploited by malware and malicious virtual machines to potentially steal secret information from computer memory. These secrets can include passwords, personal and financial records, and encryption keys. They can be potentially lifted from other applications and other customers' virtual machines, as well as SGX enclaves, and System Management Mode (SMM) memory. SGX is Intel's technology that is supposed to protect...

References

NVD-CWE-noinfohttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.htmlhttps://usn.ubuntu.com/3742-2/https://usn.ubuntu.com/3742-1/https://usn.ubuntu.com/3741-1/https://usn.ubuntu.com/3740-2/https://usn.ubuntu.com/3740-1/https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_ushttps://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.aschttps://access.redhat.com/errata/RHSA-2018:2396https://access.redhat.com/errata/RHSA-2018:2395https://access.redhat.com/errata/RHSA-2018:2394https://access.redhat.com/errata/RHSA-2018:2393https://access.redhat.com/errata/RHSA-2018:2392https://access.redhat.com/errata/RHSA-2018:2391https://access.redhat.com/errata/RHSA-2018:2390https://access.redhat.com/errata/RHSA-2018:2389https://access.redhat.com/errata/RHSA-2018:2388https://access.redhat.com/errata/RHSA-2018:2387https://access.redhat.com/errata/RHSA-2018:2384http://www.securitytracker.com/id/1041451http://www.securityfocus.com/bid/105080https://www.synology.com/support/security/Synology_SA_18_45https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannelhttps://software.intel.com/security-software-guidance/software-guidance/l1-terminal-faulthttps://foreshadowattack.eu/http://support.lenovo.com/us/en/solutions/LEN-24163https://security.netapp.com/advisory/ntap-20180815-0001/https://access.redhat.com/errata/RHSA-2018:2404https://access.redhat.com/errata/RHSA-2018:2403https://access.redhat.com/errata/RHSA-2018:2402https://support.f5.com/csp/article/K31300402https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010http://xenbits.xen.org/xsa/advisory-273.htmlhttp://www.vmware.com/security/advisories/VMSA-2018-0020.htmlhttp://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-enhttps://www.kb.cert.org/vuls/id/982149https://www.debian.org/security/2018/dsa-4274https://www.debian.org/security/2018/dsa-4279https://usn.ubuntu.com/3741-2/https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018https://usn.ubuntu.com/3756-1/https://lists.debian.org/debian-lts-announce/2018/08/msg00029.htmlhttps://access.redhat.com/errata/RHSA-2018:2603https://access.redhat.com/errata/RHSA-2018:2602https://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdfhttps://security.gentoo.org/glsa/201810-06http://www.securitytracker.com/id/1042004https://usn.ubuntu.com/3823-1/https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.htmlhttps://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfhttps://www.oracle.com/security-alerts/cpujul2020.htmlhttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/https://nvd.nist.govhttps://www.debian.org/security/./dsa-4274https://github.com/gregvish/l1tf-pochttps://www.kb.cert.org/vuls/id/982149