Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2018-3646

PUBLISHED 17.09.2024

CNA: intel

Обновлено: 15.07.2020
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.

БДУ ФСТЭК

Идентификатор Описание
BDU:2018-00996 Уязвимость процессоров Intel, связанная с возможностью спекулятивного выполнения команд и позволяющая нарушителю преодолеть механизм изоляции памяти виртуальных машин

Доп. Информация

Product Status

Multiple
Product: Multiple
Vendor: Intel Corporation
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии Multiple affected
 

Ссылки

https://www.kb.cert.org/vuls/id/982149
http://www.securitytracker.com/id/1041451
https://security.gentoo.org/glsa/201810-06
https://usn.ubuntu.com/3741-2/
https://access.redhat.com/errata/RHSA-2018:2393
https://usn.ubuntu.com/3823-1/
https://access.redhat.com/errata/RHSA-2018:2389
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2403
http://www.securityfocus.com/bid/105080
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2384
https://usn.ubuntu.com/3740-2/
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
https://www.debian.org/security/2018/dsa-4274
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5...
https://access.redhat.com/errata/RHSA-2018:2388
https://usn.ubuntu.com/3741-1/
https://access.redhat.com/errata/RHSA-2018:2603
https://access.redhat.com/errata/RHSA-2018:2402
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2...
https://usn.ubuntu.com/3742-2/
https://access.redhat.com/errata/RHSA-2018:2404
https://usn.ubuntu.com/3740-1/
https://access.redhat.com/errata/RHSA-2018:2391
https://access.redhat.com/errata/RHSA-2018:2396
https://www.debian.org/security/2018/dsa-4279
https://access.redhat.com/errata/RHSA-2018:2392
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://usn.ubuntu.com/3742-1/
https://access.redhat.com/errata/RHSA-2018:2602
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2387
https://usn.ubuntu.com/3756-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
http://xenbits.xen.org/xsa/advisory-273.html
https://foreshadowattack.eu/
https://security.netapp.com/advisory/ntap-20180815-0001/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.synology.com/support/security/Synology_SA_18_45
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010
http://www.vmware.com/security/advisories/VMSA-2018-0020.html
https://support.f5.com/csp/article/K31300402

CVE Program Container

Обновлено: 05.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://www.kb.cert.org/vuls/id/982149
http://www.securitytracker.com/id/1041451
https://security.gentoo.org/glsa/201810-06
https://usn.ubuntu.com/3741-2/
https://access.redhat.com/errata/RHSA-2018:2393
https://usn.ubuntu.com/3823-1/
https://access.redhat.com/errata/RHSA-2018:2389
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2018:2390
https://access.redhat.com/errata/RHSA-2018:2403
http://www.securityfocus.com/bid/105080
https://access.redhat.com/errata/RHSA-2018:2395
https://access.redhat.com/errata/RHSA-2018:2384
https://usn.ubuntu.com/3740-2/
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
https://www.debian.org/security/2018/dsa-4274
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5...
https://access.redhat.com/errata/RHSA-2018:2388
https://usn.ubuntu.com/3741-1/
https://access.redhat.com/errata/RHSA-2018:2603
https://access.redhat.com/errata/RHSA-2018:2402
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2...
https://usn.ubuntu.com/3742-2/
https://access.redhat.com/errata/RHSA-2018:2404
https://usn.ubuntu.com/3740-1/
https://access.redhat.com/errata/RHSA-2018:2391
https://access.redhat.com/errata/RHSA-2018:2396
https://www.debian.org/security/2018/dsa-4279
https://access.redhat.com/errata/RHSA-2018:2392
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
https://usn.ubuntu.com/3742-1/
https://access.redhat.com/errata/RHSA-2018:2602
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
https://access.redhat.com/errata/RHSA-2018:2394
https://access.redhat.com/errata/RHSA-2018:2387
https://usn.ubuntu.com/3756-1/
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
http://xenbits.xen.org/xsa/advisory-273.html
https://foreshadowattack.eu/
https://security.netapp.com/advisory/ntap-20180815-0001/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
http://support.lenovo.com/us/en/solutions/LEN-24163
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
https://www.synology.com/support/security/Synology_SA_18_45
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010
http://www.vmware.com/security/advisories/VMSA-2018-0020.html
https://support.f5.com/csp/article/K31300402

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.