Vulnerability Details : CVE-2018-3646
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
Products affected by CVE-2018-3646
- cpe:2.3:h:intel:core_i3:3229y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3227u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3130m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3120me:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2367m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2365m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2312m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2310m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2105:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2102:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:530:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:380um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3250t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3250:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3220:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3217ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3110m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2377m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2348m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2340ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2125:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2120t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:560:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:390m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:350m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3225:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3220t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3120m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3115c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2357m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2350m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2310e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2130:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2100t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:380m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:370m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3245:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3240t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3240:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3217u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:3210:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2375m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2370m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2330e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2328m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2120:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:2115c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:550:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:540:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:330e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6320:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6102e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6157u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5157u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5020u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5015u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4340:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4370t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4120u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4158u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4130:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4000m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4030u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4030y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6006u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6098p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5010u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:5005u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4340te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4350:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4100u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4170t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4170:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4005u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4010u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4350t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4360:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4102e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4110e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4160t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4160:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4010y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4012y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6300:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6300t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6167u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:6100:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4330:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4360t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4370:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4110m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4112e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4150t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4150:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4130t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4020y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i3:4025u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3550s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3550:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3437u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3427u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3339y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3337u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2557m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2550k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2405s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2400s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:680:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:480m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:650:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:580m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3610me:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3475s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3380m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3360m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3330s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3330:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2537m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2467m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2450p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2390t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:760:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:750s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:750:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:560um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:560m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:460m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:450m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3450:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3439y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3317u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3230m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2500s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2430m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2410m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2310:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2300:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:660:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:655k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3570t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3470:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3450s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3350p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3340s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3320m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:3210m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2515e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2510e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2450m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2435m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2380p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:2320:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:670:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:661:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:540um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:430um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:430m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:470um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6402p:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6350hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6300hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6585r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6440eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6440hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6267u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6287u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5287u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5257u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5575r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4302y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4220y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6685r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6400:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6400t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6260u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5350h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4422e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4410e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4440s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4440:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4308u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4310m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4310u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4200y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4258u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4402ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4402e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4430s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4430:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4330m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4340m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4202y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210h:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4260u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4278u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6500t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6442eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:6360u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5675r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5675c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5250u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:5200u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4670t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4690:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4570te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4590:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4400e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4460t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4300u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4350u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4360u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4210u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i5:4288u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2920xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:990x:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3687u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3667u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3610qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3610qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2860qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2670qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2675qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2657m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2629m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2620m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:860:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:820qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:930:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:880:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:680um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:965:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:940xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3740qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3615qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3615qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3537u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3520m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2715qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2710qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2640m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2637m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:980x:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:975:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3770k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3635qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3632qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3630qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3555le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3540m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2760qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2655le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2649m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2617m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2610ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:610e:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:875k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:870s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:660lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620le:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2960xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:920xm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3840qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3720qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3689y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3612qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3612qe:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3517ue:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:3517u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2677m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2635qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2630qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:920:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:960:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:950:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:940:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:840qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:740qm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640lm:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:620um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:2600k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:980:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:970:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:870:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:860s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640um:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:640m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7y75:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5775c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5750hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5700eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4910mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4950hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4870hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4710mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4712hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4800mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4810mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702ec:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4722hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4750hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4600m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4558u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4578u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5950hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5850hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5850eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5600u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5557u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4900mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4850hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4860hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4702mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4710hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4760hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770te:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4610m:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4610y:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770k:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4771:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4785t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4650u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:5775r:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4960hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4980hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700eq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4700mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4712mq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4720hq:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4765t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4770:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790s:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4790t:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4510u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_i7:4550u:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y71:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y70:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10c:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10a:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y10:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y51:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m:5y31:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:6y30:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:7y32:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m3:7y30:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m5:6y57:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m5:6y54:*:*:*:*:*:*:*
- cpe:2.3:h:intel:core_m7:6y75:*:*:*:*:*:*:*
- cpe:2.3:h:intel:xeon:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-3646
5.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-3646
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.7
|
MEDIUM | AV:L/AC:M/Au:N/C:C/I:N/A:N |
3.4
|
6.9
|
NIST | |
5.6
|
MEDIUM | CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
1.1
|
4.0
|
NIST |
References for CVE-2018-3646
-
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
-
http://www.securityfocus.com/bid/105080
Multiple Intel Processors Side Channel Attack Multiple Information Disclosure VulnerabilitiesThird Party Advisory;VDB Entry
-
https://foreshadowattack.eu/
Foreshadow: Breaking the Virtual Memory Abstraction with Transient Out-of-Order ExecutionTechnical Description;Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2396
RHSA-2018:2396 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3756-1/
USN-3756-1: Intel Microcode vulnerabilities | Ubuntu security notices
-
https://security.netapp.com/advisory/ntap-20180815-0001/
Intel SA-00161 L1 Terminal Fault Vulnerabilities in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://usn.ubuntu.com/3742-2/
USN-3742-2: Linux kernel (Trusty HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2389
RHSA-2018:2389 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180018
ADV180018 | Microsoft Guidance to mitigate L1TF variant
-
https://www.oracle.com/security-alerts/cpujul2020.html
Oracle Critical Patch Update Advisory - July 2020
-
https://www.debian.org/security/2018/dsa-4274
Debian -- Security Information -- DSA-4274-1 xen
-
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
HPESBHF03874 rev.1 - Certain HPE Products using Intel-based Processors, L1 Terminal Fault (L1TF) Speculative Side-channel Vulnerabilities, Local Disclosure of InformationThird Party Advisory
-
https://usn.ubuntu.com/3741-2/
USN-3741-2: Linux kernel (Xenial HWE) vulnerabilities | Ubuntu security notices
-
http://www.vmware.com/security/advisories/VMSA-2018-0020.html
VMSA-2018-0020Third Party Advisory
-
https://www.kb.cert.org/vuls/id/982149
VU#982149 - Intel processors are vulnerable to a speculative execution side-channel attack called L1 Terminal Fault (L1TF)
-
https://access.redhat.com/errata/RHSA-2018:2393
RHSA-2018:2393 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3742-1/
USN-3742-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2390
RHSA-2018:2390 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.debian.org/security/2018/dsa-4279
Debian -- Security Information -- DSA-4279-1 linux
-
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
Security fixes in StruxureWare Data Center Expert v7.6.0 - User assistance for StruxureWare Data Center Expert 7.x - Help Center: Support for EcoStruxure IT, StruxureWare for Data Centers, and NetBotz
-
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
Security Advisory - CPU Side Channel Vulnerability "L1TF"Third Party Advisory
-
http://www.securitytracker.com/id/1041451
Intel CPUs Let Local Users Obtain or Infer Portions of L1 Cache Memory on the Target System - SecurityTrackerThird Party Advisory;VDB Entry
-
https://www.synology.com/support/security/Synology_SA_18_45
Synology Inc.Third Party Advisory
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
CPU Side-Channel Information Disclosure Vulnerabilities: August 2018Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2392
RHSA-2018:2392 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3740-1/
USN-3740-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XRFKQWYV2H4BV75CUNGCGE5TNVQCLBGZ/
[SECURITY] Fedora 27 Update: kernel-4.17.14-102.fc27 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://www.securitytracker.com/id/1042004
Apple macOS/OS X Multiple Remote Code Execution, Denial of Service, and Information Disclosure Attacks and Local Privilege Escalation Attacks - SecurityTracker
-
https://access.redhat.com/errata/RHSA-2018:2388
RHSA-2018:2388 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/08/msg00029.html
[SECURITY] [DLA 1481-1] linux-4.9 security update
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V4UWGORQWCENCIF2BHWUEF2ODBV75QS2/
[SECURITY] Fedora 28 Update: kernel-4.17.14-202.fc28 - package-announce - Fedora Mailing-ListsThird Party Advisory
-
http://support.lenovo.com/us/en/solutions/LEN-24163
L1 Terminal Fault Side Channel Vulnerabilities - USThird Party Advisory
-
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
Oracle Critical Patch Update - April 2019
-
https://access.redhat.com/errata/RHSA-2018:2387
RHSA-2018:2387 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://security.gentoo.org/glsa/201810-06
Xen: Multiple vulnerabilities (GLSA 201810-06) — Gentoo security
-
https://usn.ubuntu.com/3823-1/
USN-3823-1: Linux kernel vulnerabilities | Ubuntu security notices
-
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Oracle Critical Patch Update - January 2019
-
https://access.redhat.com/errata/RHSA-2018:2402
RHSA-2018:2402 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2391
RHSA-2018:2391 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2603
RHSA-2018:2603 - Security Advisory - Red Hat Customer Portal
-
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
L1 Terminal FaultMitigation;Vendor Advisory
-
http://xenbits.xen.org/xsa/advisory-273.html
XSA-273 - Xen Security AdvisoriesThird Party Advisory
-
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
-
https://access.redhat.com/errata/RHSA-2018:2384
RHSA-2018:2384 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2395
RHSA-2018:2395 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://support.f5.com/csp/article/K31300402
Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
[SECURITY] [DLA 1506-1] intel-microcode security update
-
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0010
SonicWall Security AdvisoryThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2602
RHSA-2018:2602 - Security Advisory - Red Hat Customer Portal
-
https://usn.ubuntu.com/3740-2/
USN-3740-2: Linux kernel (HWE) vulnerabilities | Ubuntu security noticesThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2404
RHSA-2018:2404 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2394
RHSA-2018:2394 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
INTEL-SA-00161Vendor Advisory
-
https://security.FreeBSD.org/advisories/FreeBSD-SA-18:09.l1tf.asc
Third Party Advisory
-
https://access.redhat.com/errata/RHSA-2018:2403
RHSA-2018:2403 - Security Advisory - Red Hat Customer PortalThird Party Advisory
-
https://usn.ubuntu.com/3741-1/
USN-3741-1: Linux kernel vulnerabilities | Ubuntu security noticesThird Party Advisory
Jump to