mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
358 lines
15 KiB
JSON
358 lines
15 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "secure@intel.com",
|
|
"DATE_PUBLIC": "2018-01-03T00:00:00",
|
|
"ID": "CVE-2017-5753",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Most Modern Operating Systems",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "All"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Intel Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information Disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4609"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"
|
|
},
|
|
{
|
|
"name": "DSA-4187",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4187"
|
|
},
|
|
{
|
|
"name": "USN-3542-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3542-2/"
|
|
},
|
|
{
|
|
"name": "GLSA-201810-06",
|
|
"refsource": "GENTOO",
|
|
"url": "https://security.gentoo.org/glsa/201810-06"
|
|
},
|
|
{
|
|
"name": "USN-3540-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3540-2/"
|
|
},
|
|
{
|
|
"name": "https://access.redhat.com/security/vulnerabilities/speculativeexecution",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://access.redhat.com/security/vulnerabilities/speculativeexecution"
|
|
},
|
|
{
|
|
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"
|
|
},
|
|
{
|
|
"name": "USN-3597-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3597-1/"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0012",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0011",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4611"
|
|
},
|
|
{
|
|
"name": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html",
|
|
"refsource": "MISC",
|
|
"url": "https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"
|
|
},
|
|
{
|
|
"name": "https://cert.vde.com/en-us/advisories/vde-2018-002",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert.vde.com/en-us/advisories/vde-2018-002"
|
|
},
|
|
{
|
|
"name": "USN-3580-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3580-1/"
|
|
},
|
|
{
|
|
"name": "https://support.f5.com/csp/article/K91229003",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.f5.com/csp/article/K91229003"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2018:0022",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"
|
|
},
|
|
{
|
|
"name": "DSA-4188",
|
|
"refsource": "DEBIAN",
|
|
"url": "https://www.debian.org/security/2018/dsa-4188"
|
|
},
|
|
{
|
|
"name": "RHSA-2018:0292",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2018:0292"
|
|
},
|
|
{
|
|
"name": "http://xenbits.xen.org/xsa/advisory-254.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://xenbits.xen.org/xsa/advisory-254.html"
|
|
},
|
|
{
|
|
"name": "https://security.netapp.com/advisory/ntap-20180104-0001/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security.netapp.com/advisory/ntap-20180104-0001/"
|
|
},
|
|
{
|
|
"name": "https://www.synology.com/support/security/Synology_SA_18_01",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.synology.com/support/security/Synology_SA_18_01"
|
|
},
|
|
{
|
|
"name": "https://01.org/security/advisories/intel-oss-10002",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://01.org/security/advisories/intel-oss-10002"
|
|
},
|
|
{
|
|
"name": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html",
|
|
"refsource": "MISC",
|
|
"url": "http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"
|
|
},
|
|
{
|
|
"name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"
|
|
},
|
|
{
|
|
"name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"
|
|
},
|
|
{
|
|
"name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"
|
|
},
|
|
{
|
|
"name": "VU#584653",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/584653"
|
|
},
|
|
{
|
|
"name": "VU#180049",
|
|
"refsource": "CERT-VN",
|
|
"url": "https://www.kb.cert.org/vuls/id/180049"
|
|
},
|
|
{
|
|
"name": "https://cert.vde.com/en-us/advisories/vde-2018-003",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert.vde.com/en-us/advisories/vde-2018-003"
|
|
},
|
|
{
|
|
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
|
|
},
|
|
{
|
|
"name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
|
|
},
|
|
{
|
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"
|
|
},
|
|
{
|
|
"name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"
|
|
},
|
|
{
|
|
"name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"
|
|
},
|
|
{
|
|
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"
|
|
},
|
|
{
|
|
"name": "USN-3549-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3549-1/"
|
|
},
|
|
{
|
|
"name": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"
|
|
},
|
|
{
|
|
"name": "https://support.citrix.com/article/CTX231399",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.citrix.com/article/CTX231399"
|
|
},
|
|
{
|
|
"name": "https://spectreattack.com/",
|
|
"refsource": "MISC",
|
|
"url": "https://spectreattack.com/"
|
|
},
|
|
{
|
|
"name": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"
|
|
},
|
|
{
|
|
"name": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"
|
|
},
|
|
{
|
|
"name": "1040071",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1040071"
|
|
},
|
|
{
|
|
"name": "102371",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/102371"
|
|
},
|
|
{
|
|
"name": "USN-3597-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3597-2/"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4614"
|
|
},
|
|
{
|
|
"name": "SUSE-SU-2018:0010",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"
|
|
},
|
|
{
|
|
"name": "USN-3540-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3540-1/"
|
|
},
|
|
{
|
|
"name": "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
|
|
"refsource": "CISCO",
|
|
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"
|
|
},
|
|
{
|
|
"name": "USN-3516-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/usn/usn-3516-1/"
|
|
},
|
|
{
|
|
"name": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"
|
|
},
|
|
{
|
|
"name": "43427",
|
|
"refsource": "EXPLOIT-DB",
|
|
"url": "https://www.exploit-db.com/exploits/43427/"
|
|
},
|
|
{
|
|
"name": "USN-3541-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3541-1/"
|
|
},
|
|
{
|
|
"name": "USN-3541-2",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3541-2/"
|
|
},
|
|
{
|
|
"name": "USN-3542-1",
|
|
"refsource": "UBUNTU",
|
|
"url": "https://usn.ubuntu.com/3542-1/"
|
|
},
|
|
{
|
|
"name": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html",
|
|
"refsource": "MISC",
|
|
"url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"
|
|
},
|
|
{
|
|
"name": "https://support.lenovo.com/us/en/solutions/LEN-18282",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://support.lenovo.com/us/en/solutions/LEN-18282"
|
|
},
|
|
{
|
|
"name": "openSUSE-SU-2018:0023",
|
|
"refsource": "SUSE",
|
|
"url": "http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"
|
|
},
|
|
{
|
|
"name": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://nvidia.custhelp.com/app/answers/detail/a_id/4613"
|
|
}
|
|
]
|
|
}
|
|
} |