Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2018-3620

PUBLISHED 17.09.2024

CNA: intel

Обновлено: 15.07.2020
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

БДУ ФСТЭК

Идентификатор Описание
BDU:2018-00995 Уязвимость процессоров Intel, связанная с возможностью спекулятивного выполнения команд и позволяющая нарушителю получить несанкционированный доступ к памяти ядра операционной системы или SMM-памяти

Доп. Информация

Product Status

Multiple
Product: Multiple
Vendor: Intel Corporation
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии Multiple affected
 

Ссылки

https://www.kb.cert.org/vuls/id/982149
http://www.securitytracker.com/id/1041451
https://security.gentoo.org/glsa/201810-06
https://usn.ubuntu.com/3741-2/
https://access.redhat.com/errata/RHSA-2018:2393
https://usn.ubuntu.com/3823-1/
https://access.redhat.com/errata/RHSA-2018:2389
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2403
http://www.securityfocus.com/bid/105080
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2384
https://usn.ubuntu.com/3740-2/
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
https://www.debian.org/security/2018/dsa-4274
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5...
https://access.redhat.com/errata/RHSA-2018:2388
https://usn.ubuntu.com/3741-1/
https://access.redhat.com/errata/RHSA-2018:2603
https://access.redhat.com/errata/RHSA-2018:2402
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2...
https://usn.ubuntu.com/3742-2/
https://access.redhat.com/errata/RHSA-2018:2404
https://usn.ubuntu.com/3740-1/
https://access.redhat.com/errata/RHSA-2018:2391
https://access.redhat.com/errata/RHSA-2018:2396
https://www.debian.org/security/2018/dsa-4279
https://access.redhat.com/errata/RHSA-2018:2392
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://usn.ubuntu.com/3742-1/
https://access.redhat.com/errata/RHSA-2018:2602
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2387
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
http://xenbits.xen.org/xsa/advisory-273.html
https://foreshadowattack.eu/
http://www.vmware.com/security/advisories/VMSA-2018-0021.html
https://security.netapp.com/advisory/ntap-20180815-0001/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
https://support.f5.com/csp/article/K95275140
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.synology.com/support/security/Synology_SA_18_45
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

CVE Program Container

Обновлено: 05.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://www.kb.cert.org/vuls/id/982149
http://www.securitytracker.com/id/1041451
https://security.gentoo.org/glsa/201810-06
https://usn.ubuntu.com/3741-2/
https://access.redhat.com/errata/RHSA-2018:2393
https://usn.ubuntu.com/3823-1/
https://access.redhat.com/errata/RHSA-2018:2389
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2403
http://www.securityfocus.com/bid/105080
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2384
https://usn.ubuntu.com/3740-2/
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
https://www.debian.org/security/2018/dsa-4274
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5...
https://access.redhat.com/errata/RHSA-2018:2388
https://usn.ubuntu.com/3741-1/
https://access.redhat.com/errata/RHSA-2018:2603
https://access.redhat.com/errata/RHSA-2018:2402
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2...
https://usn.ubuntu.com/3742-2/
https://access.redhat.com/errata/RHSA-2018:2404
https://usn.ubuntu.com/3740-1/
https://access.redhat.com/errata/RHSA-2018:2391
https://access.redhat.com/errata/RHSA-2018:2396
https://www.debian.org/security/2018/dsa-4279
https://access.redhat.com/errata/RHSA-2018:2392
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://usn.ubuntu.com/3742-1/
https://access.redhat.com/errata/RHSA-2018:2602
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2387
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
http://xenbits.xen.org/xsa/advisory-273.html
https://foreshadowattack.eu/
http://www.vmware.com/security/advisories/VMSA-2018-0021.html
https://security.netapp.com/advisory/ntap-20180815-0001/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
https://support.f5.com/csp/article/K95275140
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.synology.com/support/security/Synology_SA_18_45
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.