Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
History
21 Nov 2024, 03:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html - Broken Link | |
References | () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html - Broken Link | |
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4609Â - Third Party Advisory | |
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4611Â - Third Party Advisory | |
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4613Â - Third Party Advisory | |
References | () http://nvidia.custhelp.com/app/answers/detail/a_id/4614Â - Third Party Advisory | |
References | () http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html - Third Party Advisory, VDB Entry | |
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt - Third Party Advisory | |
References | () http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt - Third Party Advisory | |
References | () http://www.kb.cert.org/vuls/id/584653Â - Third Party Advisory, US Government Resource | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - Third Party Advisory | |
References | () http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - Third Party Advisory | |
References | () http://www.securityfocus.com/bid/102376Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040071Â - Third Party Advisory, VDB Entry | |
References | () http://xenbits.xen.org/xsa/advisory-254.html - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2018:0292Â - Third Party Advisory | |
References | () https://access.redhat.com/security/vulnerabilities/speculativeexecution - Third Party Advisory | |
References | () https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/Â - Third Party Advisory | |
References | () https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/Â - Third Party Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf - Third Party Advisory | |
References | () https://cert.vde.com/en-us/advisories/vde-2018-002Â - Third Party Advisory | |
References | () https://cert.vde.com/en-us/advisories/vde-2018-003Â - Third Party Advisory | |
References | () https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability - Third Party Advisory | |
References | () https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html - Third Party Advisory | |
References | () https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html - | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002Â - Patch, Third Party Advisory, Vendor Advisory | |
References | () https://seclists.org/bugtraq/2019/Jun/36Â - Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Nov/16Â - Issue Tracking, Mailing List, Third Party Advisory | |
References | () https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr - Vendor Advisory | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc - Third Party Advisory | |
References | () https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/201810-06Â - Third Party Advisory | |
References | () https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20180104-0001/Â - Third Party Advisory | |
References | () https://security.paloaltonetworks.com/CVE-2017-5715Â - Third Party Advisory | |
References | () https://spectreattack.com/Â - Third Party Advisory | |
References | () https://support.citrix.com/article/CTX231399Â - Third Party Advisory | |
References | () https://support.f5.com/csp/article/K91229003Â - Third Party Advisory | |
References | () https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us - Third Party Advisory | |
References | () https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us - Third Party Advisory | |
References | () https://support.lenovo.com/us/en/solutions/LEN-18282Â - Third Party Advisory | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel - Third Party Advisory | |
References | () https://usn.ubuntu.com/3531-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3531-3/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3540-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3541-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3542-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3549-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3560-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3561-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3580-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3581-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3581-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3582-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3582-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3594-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3597-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3597-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3620-2/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3690-1/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/3777-3/Â - Third Party Advisory | |
References | () https://usn.ubuntu.com/usn/usn-3516-1/Â - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4120Â - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4187Â - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4188Â - Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4213Â - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/43427/Â - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.kb.cert.org/vuls/id/180049Â - Third Party Advisory, US Government Resource | |
References | () https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001Â - Third Party Advisory | |
References | () https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - Third Party Advisory | |
References | () https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/Â - Third Party Advisory | |
References | () https://www.synology.com/support/security/Synology_SA_18_01Â - Third Party Advisory | |
References | () https://www.vmware.com/security/advisories/VMSA-2018-0007.html - Third Party Advisory | |
References | () https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html - Third Party Advisory | |
References | () https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html - Third Party Advisory |
Information
Published : 2018-01-04 13:29
Updated : 2024-11-21 03:28
NVD link : CVE-2017-5715
Mitre link : CVE-2017-5715
CVE.ORG link : CVE-2017-5715
JSON object : View
Products Affected
intel
- xeon_e5_2620
- xeon_e5_2630_v2
- xeon_e3_1505l_v6
- xeon_e5_2628l_v2
- xeon_e5_2637
- xeon_e3_1225
- xeon_e3_1235
- xeon_e5_2608l_v3
- xeon_e5_1620_v4
- xeon_e5_2640_v2
- core_m7
- xeon_e5_2620_v3
- xeon_e3_1265l_v2
- xeon_e5_2630
- xeon_e5_2609
- xeon_e5_2448l_v2
- xeon_e5_2440
- atom_x7-e3950
- xeon_e3_1240_v6
- xeon_e3_1245_v3
- xeon_e5_2430l
- xeon_bronze_3106
- xeon_e5_1650_v3
- xeon_e5_1630_v3
- xeon_e3_1225_v2
- xeon_e5_1680_v4
- xeon_e5_2603_v4
- xeon_e5_2630_v3
- xeon_e3_1270_v3
- xeon_e5_2643_v2
- xeon_e3_1265l_v4
- xeon_e5_2609_v2
- xeon_e5_2643_v3
- xeon_e3_1240l_v5
- xeon_e3_1501l_v6
- xeon_e5_2630_v4
- xeon_e5_2640_v3
- atom_z
- xeon_e3_1280_v5
- xeon_e5_2650
- xeon_platinum
- xeon_e3_1220_v5
- atom_x5-e3930
- xeon_e5_2650l_v2
- xeon_e3_1268l_v3
- xeon_e5_2648l_v4
- xeon_e3_1275_v6
- xeon_e5
- xeon_e3_1230_v2
- xeon_e3_1270_v6
- xeon_e5_1660
- xeon_e5_2450l_v2
- xeon_e5_2428l
- xeon_e3_1501m_v6
- xeon_e5_2609_v3
- xeon_e3_1235l_v5
- xeon_e3_1270_v2
- atom_c
- xeon_e3_1280_v2
- xeon_e3_1505l_v5
- xeon_e5_2643_v4
- xeon_e5_2618l_v4
- xeon_bronze_3104
- xeon_e3_1276_v3
- xeon_e3_1290_v2
- xeon_silver
- xeon_e5_2609_v4
- xeon_e3_12201
- xeon_e5_2637_v2
- xeon_e5_2640
- xeon_e3_1505m_v5
- xeon_e3_1240l_v3
- xeon_e5_2630l_v2
- xeon_e3_1240_v2
- xeon_e3_1265l_v3
- xeon_e3_1270
- xeon_e5_2603_v3
- xeon_e5_2430_v2
- xeon_e5_1620_v3
- xeon_e5_2450_v2
- xeon_e5_1680_v3
- xeon_e5_2420_v2
- xeon_e5_2418l
- xeon_e3_1225_v3
- xeon_e5_2428l_v3
- xeon_e5_2403_v2
- xeon
- xeon_e3_1271_v3
- xeon_e5_1650
- xeon_e5_1428l_v3
- xeon_e3_1281_v3
- atom_x5-e3940
- xeon_e5_1630_v4
- xeon_e5_2470_v2
- xeon_e5_1660_v4
- xeon_e3_1245_v5
- xeon_e3_1245
- xeon_e5_2650_v3
- xeon_e-1105c
- xeon_e5_2450
- xeon_e3_1230l_v3
- xeon_e5_2640_v4
- xeon_e5_1650_v4
- xeon_e5_2650l_v3
- xeon_e3_1230_v6
- xeon_e5_2403
- xeon_e3_1241_v3
- xeon_e5_2628l_v4
- xeon_e3_1275_v3
- core_i5
- xeon_e3_1220_v2
- xeon_e3_1125c_v2
- xeon_e5_2623_v4
- xeon_e5_2603
- xeon_e3_1245_v2
- xeon_e5_2618l_v2
- xeon_e3_1220_v6
- xeon_e5_2650l
- xeon_e3_1230
- xeon_e5_2643
- xeon_e3_1290
- xeon_e3_1270_v5
- xeon_e3_1240_v3
- xeon_e5_2440_v2
- atom_e
- xeon_e5_2637_v4
- xeon_e7
- xeon_e5_2470
- xeon_e3_1231_v3
- xeon_e3_1260l_v5
- xeon_e3
- xeon_e5_2630l
- xeon_e5_2630l_v3
- xeon_e5_2637_v3
- xeon_e3_1275
- xeon_e5_2438l_v3
- xeon_e5_2428l_v2
- xeon_e5_2407_v2
- xeon_e5_1650_v2
- xeon_e3_1268l_v5
- atom_x3
- xeon_e3_1280
- xeon_e3_1280_v6
- xeon_e5_1660_v3
- core_m5
- xeon_gold
- xeon_e3_1285l_v4
- core_m
- xeon_e3_1125c
- xeon_e5_2650_v2
- xeon_e5_2628l_v3
- xeon_e3_1245_v6
- xeon_e3_1275_v2
- xeon_e3_1225_v6
- xeon_e3_1286_v3
- xeon_e5_2407
- xeon_e5_2448l
- pentium_n
- xeon_e3_1220
- xeon_e5_2648l_v2
- xeon_e3_1285_v4
- xeon_e3_1258l_v4
- xeon_e3_1275l_v3
- xeon_e5_2603_v2
- celeron_n
- xeon_e5_1620
- xeon_e5_2650_v4
- xeon_e5_1428l
- xeon_e3_1220_v3
- xeon_e3_12201_v2
- xeon_e5_2420
- xeon_e5_2648l
- xeon_e5_2418l_v3
- xeon_e3_1230_v3
- xeon_e3_1246_v3
- xeon_e3_1286l_v3
- xeon_e5_1660_v2
- xeon_e3_1230_v5
- xeon_e5_2408l_v3
- xeon_e3_1285_v3
- xeon_e3_1240
- xeon_e3_1260l
- core_m3
- xeon_e5_1428l_v2
- xeon_phi
- xeon_e3_1278l_v4
- xeon_e5_2620_v2
- xeon_e5_2620_v4
- xeon_e3_1275_v5
- xeon_e3_1285l_v3
- xeon_e3_1226_v3
- xeon_e5_2630l_v4
- celeron_j
- xeon_e5_2618l_v3
- xeon_e5_1620_v2
- pentium_j
- core_i7
- xeon_e5_2608l_v4
- xeon_e3_1225_v5
- xeon_e5_2430l_v2
- xeon_e3_1105c_v2
- xeon_e3_1220l_v3
- xeon_e5_2418l_v2
- xeon_e3_1285_v6
- xeon_e5_2450l
- xeon_e5_2623_v3
- xeon_e3_1280_v3
- xeon_e5_2648l_v3
- xeon_e5_2430
- core_i3
- xeon_e3_1240_v5
netapp
- hci_management_node
- hci_compute_node
- solidfire
arm
- cortex-a
siemens
- simatic_winac_rtx_\(f\)_2010
- simatic_winac_rtx_\(f\)_firmware
oracle
- communications_diameter_signaling_router
- vm_virtualbox
canonical
- ubuntu_linux
debian
- debian_linux
CWE
CWE-203
Observable Discrepancy