Vulnerability Details : CVE-2018-3620
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Products affected by CVE-2018-3620
- cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*
- cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-3620
3.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 86 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-3620
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:N/A:N |
3.4
|
6.9
|
NIST | |
5.6
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.1
|
4.0
|
NIST |
CWE ids for CVE-2018-3620
-
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-3620
-
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
-
http://www.securityfocus.com/bid/105080
Multiple Intel Processors Side Channel Attack Multiple Information Disclosure VulnerabilitiesThird Party Advisory;VDB Entry
-
https://foreshadowattack.eu/
Foreshadow: Breaking the Virtual Memory Abstraction with Transient Out-of-Order ExecutionTechnical Description;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2396
RHSA-2018:2396 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.netapp.com/advisory/ntap-20180815-0001/
Intel SA-00161 L1 Terminal Fault Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://usn.ubuntu.com/3742-2/
USN-3742-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2389
RHSA-2018:2389 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
ADV180018 | Microsoft Guidance to mitigate L1TF variant
-
https://www.oracle.com/security-alerts/cpujul2020.html
Oracle Critical Patch Update Advisory - July 2020
-
https://www.debian.org/security/2018/dsa-4274
Debian -- Security Information -- DSA-4274-1 xen
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
HPESBHF03874 rev.1 - Certain HPE Products using Intel-based Processors, L1 Terminal Fault (L1TF) Speculative Side-channel Vulnerabilities, Local Disclosure of InformationThird Party Advisory
-
https://usn.ubuntu.com/3741-2/
USN-3741-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices
-
https://www.kb.cert.org/vuls/id/982149
VU#982149 - Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)
-
https://access.redhat.com/errata/RHSA-2018:2393
RHSA-2018:2393 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3742-1/
USN-3742-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2390
RHSA-2018:2390 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4279
Debian -- Security Information -- DSA-4279-1 linux
-
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Security fixes in StruxureWare Data Center Expert v7.6.0 - User assistance for StruxureWare Data Center Expert 7.x - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
Security Advisory - CPU Side Channel Vulnerability "L1TF"Third Party Advisory
-
http://www.securitytracker.com/id/1041451
Intel CPUs Let Local Users Obtain or Infer Portions of L1 Cache Memory on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.vmware.com/security/advisories/VMSA-2018-0021.html
VMSA-2018-0021.2Third Party Advisory
-
https://www.synology.com/support/security/Synology_SA_18_45
Synology Inc.Third Party Advisory
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
CPU Side-Channel Information Disclosure Vulnerabilities: August 2018Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2392
RHSA-2018:2392 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3740-1/
USN-3740-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/
[SECURITY] Fedora 27 Update: kernel-4.17.14-102.fc27 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2388
RHSA-2018:2388 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
[SECURITY] [DLA 1481-1] linux-4.9 security update
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/
[SECURITY] Fedora 28 Update: kernel-4.17.14-202.fc28 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://support.lenovo.com/us/en/solutions/LEN-24163
L1 Terminal Fault Side Channel Vulnerabilities - USThird Party Advisory
-
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Oracle Critical Patch Update - April 2019
-
https://access.redhat.com/errata/RHSA-2018:2387
RHSA-2018:2387 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201810-06
Xen: Multiple vulnerabilities (GLSA 201810-06) — Gentoo security
-
https://usn.ubuntu.com/3823-1/
USN-3823-1: Linux kernel vulnerabilities | Ubuntu security notices
-
https://access.redhat.com/errata/RHSA-2018:2402
RHSA-2018:2402 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2391
RHSA-2018:2391 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://support.f5.com/csp/article/K95275140
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2603
RHSA-2018:2603 - Security Advisory - Red Hat Customer Portal
-
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
L1 Terminal FaultMitigation;Vendor Advisory
-
http://xenbits.xen.org/xsa/advisory-273.html
XSA-273 - Xen Security AdvisoriesThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
-
https://access.redhat.com/errata/RHSA-2018:2384
RHSA-2018:2384 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2395
RHSA-2018:2395 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
[SECURITY] [DLA 1506-1] intel-microcode security update
-
https://access.redhat.com/errata/RHSA-2018:2602
RHSA-2018:2602 - Security Advisory - Red Hat Customer Portal
-
https://usn.ubuntu.com/3740-2/
USN-3740-2: Linux kernel (HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2404
RHSA-2018:2404 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2394
RHSA-2018:2394 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
INTEL-SA-00161Vendor Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2403
RHSA-2018:2403 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3741-1/
USN-3741-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0009
SonicWall Security AdvisoryThird Party Advisory
Jump to