mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
528 lines
22 KiB
JSON
528 lines
22 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@intel.com",
|
|
"DATE_PUBLIC": "2018-01-03T00:00:00",
|
|
"ID": "CVE-2017-5715",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Microprocessors with Speculative Execution",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Intel Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information Disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
|
|
},
|
|
{
|
|
"name": "USN-3560-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3560-1/"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
|
|
},
|
|
{
|
|
"name": "DSA-4187",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4187"
|
|
},
|
|
{
|
|
"name": "USN-3542-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3542-2/"
|
|
},
|
|
{
|
|
"name": "GLSA-201810-06",
|
|
"refsource": "GENTOO",
|
|
"url": "https://security.gentoo.org/glsa/201810-06"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html"
|
|
},
|
|
{
|
|
"name": "USN-3540-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3540-2/"
|
|
},
|
|
{
|
|
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
|
|
},
|
|
{
|
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180906 [SECURITY] [DLA 1497-1] qemu security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html"
|
|
},
|
|
{
|
|
"name": "USN-3597-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3597-1/"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0012",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0011",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
|
|
},
|
|
{
|
|
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
|
|
"refsource": "MISC",
|
|
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
|
|
},
|
|
{
|
|
"name": "DSA-4213",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4213"
|
|
},
|
|
{
|
|
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
|
|
},
|
|
{
|
|
"name": "DSA-4120",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4120"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2018:0013",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00009.html"
|
|
},
|
|
{
|
|
"name": "USN-3580-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3580-1/"
|
|
},
|
|
{
|
|
"name": "https://support.f5.com/csp/article/K91229003",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.f5.com/csp/article/K91229003"
|
|
},
|
|
{
|
|
"name": "USN-3531-3",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3531-3/"
|
|
},
|
|
{
|
|
"name": "USN-3620-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3620-2/"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2018:0022",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
|
|
},
|
|
{
|
|
"name": "USN-3582-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3582-1/"
|
|
},
|
|
{
|
|
"name": "DSA-4188",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4188"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:0292",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
|
|
},
|
|
{
|
|
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
|
|
},
|
|
{
|
|
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0019",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00012.html"
|
|
},
|
|
{
|
|
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
|
|
},
|
|
{
|
|
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
|
|
"refsource": "MISC",
|
|
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
|
|
},
|
|
{
|
|
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
|
|
},
|
|
{
|
|
"name": "102376",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/102376"
|
|
},
|
|
{
|
|
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
|
|
},
|
|
{
|
|
"name": "USN-3594-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3594-1/"
|
|
},
|
|
{
|
|
"name": "VU#584653",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/584653"
|
|
},
|
|
{
|
|
"name": "VU#180049",
|
|
"refsource": "CERT-VN",
|
|
"url": "https://www.kb.cert.org/vuls/id/180049"
|
|
},
|
|
{
|
|
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
|
|
},
|
|
{
|
|
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0009",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00005.html"
|
|
},
|
|
{
|
|
"name": "USN-3690-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3690-1/"
|
|
},
|
|
{
|
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
|
|
},
|
|
{
|
|
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
|
|
},
|
|
{
|
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
|
|
},
|
|
{
|
|
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0004.html"
|
|
},
|
|
{
|
|
"name": "USN-3549-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3549-1/"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0007",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00003.html"
|
|
},
|
|
{
|
|
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
|
|
},
|
|
{
|
|
"name": "https://support.citrix.com/article/CTX231399",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.citrix.com/article/CTX231399"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html"
|
|
},
|
|
{
|
|
"name": "https://spectreattack.com/",
|
|
"refsource": "MISC",
|
|
"url": "https://spectreattack.com/"
|
|
},
|
|
{
|
|
"name": "USN-3531-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3531-1/"
|
|
},
|
|
{
|
|
"name": "FreeBSD-SA-18:03",
|
|
"refsource": "FREEBSD",
|
|
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-18:03.speculative_execution.asc"
|
|
},
|
|
{
|
|
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0006",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00002.html"
|
|
},
|
|
{
|
|
"name": "USN-3581-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3581-1/"
|
|
},
|
|
{
|
|
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
|
|
},
|
|
{
|
|
"name": "1040071",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1040071"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html"
|
|
},
|
|
{
|
|
"name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00088&languageid=en-fr"
|
|
},
|
|
{
|
|
"name": "USN-3597-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3597-2/"
|
|
},
|
|
{
|
|
"name": "USN-3581-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3581-2/"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0010",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html"
|
|
},
|
|
{
|
|
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
|
|
"refsource": "CISCO",
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
|
|
},
|
|
{
|
|
"name": "USN-3516-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
|
|
},
|
|
{
|
|
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
|
|
},
|
|
{
|
|
"name": "43427",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/43427/"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0020",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00013.html"
|
|
},
|
|
{
|
|
"name": "USN-3541-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3541-2/"
|
|
},
|
|
{
|
|
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
|
|
"refsource": "MISC",
|
|
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
|
|
},
|
|
{
|
|
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
|
|
},
|
|
{
|
|
"name": "USN-3777-3",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3777-3/"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2018:0023",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
|
|
},
|
|
{
|
|
"name": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.vmware.com/security/advisories/VMSA-2018-0007.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0008",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00004.html"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
|
|
},
|
|
{
|
|
"name": "USN-3561-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3561-1/"
|
|
},
|
|
{
|
|
"name": "USN-3582-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3582-2/"
|
|
},
|
|
{
|
|
"refsource": "BUGTRAQ",
|
|
"name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update",
|
|
"url": "https://seclists.org/bugtraq/2019/Jun/36"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt",
|
|
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"
|
|
},
|
|
{
|
|
"url": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html",
|
|
"refsource": "MISC",
|
|
"name": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
|
|
},
|
|
{
|
|
"refsource": "CONFIRM",
|
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf",
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"
|
|
},
|
|
{
|
|
"refsource": "FREEBSD",
|
|
"name": "FreeBSD-SA-19:26",
|
|
"url": "https://security.FreeBSD.org/advisories/FreeBSD-SA-19:26.mcu.asc"
|
|
},
|
|
{
|
|
"refsource": "BUGTRAQ",
|
|
"name": "20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu",
|
|
"url": "https://seclists.org/bugtraq/2019/Nov/16"
|
|
},
|
|
{
|
|
"refsource": "MISC",
|
|
"name": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html",
|
|
"url": "http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html"
|
|
},
|
|
{
|
|
"name": "https://security.paloaltonetworks.com/CVE-2017-5715",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security.paloaltonetworks.com/CVE-2017-5715"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20200320 [SECURITY] [DLA 2148-1] amd64-microcode security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2020/03/msg00025.html"
|
|
},
|
|
{
|
|
"refsource": "MLIST",
|
|
"name": "[debian-lts-announce] 20210816 [SECURITY] [DLA 2743-1] amd64-microcode security update",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2021/08/msg00019.html"
|
|
}
|
|
]
|
|
}
|
|
} |