TROYANOSYVIRUS
Retour aux CVEs

CVE-2018-3639

MEDIUM
5.5

Description

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Details CVE

Score CVSS v3.15.5
SeveriteMEDIUM
Vecteur CVSSCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Vecteur d'attaqueLOCAL
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie5/22/2018
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0

Produits affectes

arm:cortex-acanonical:ubuntu_linuxdebian:debian_linuxintel:atom_cintel:atom_eintel:atom_x5-e3930intel:atom_x5-e3940intel:atom_x7-e3950intel:atom_zintel:celeron_jintel:celeron_nintel:core_i3intel:core_i5intel:core_i7intel:core_mintel:pentiumintel:pentium_jintel:pentium_silverintel:xeon_e-1105cintel:xeon_e3intel:xeon_e3_1105c_v2intel:xeon_e3_1125c_v2intel:xeon_e3_12201intel:xeon_e3_12201_v2intel:xeon_e3_1220_v2intel:xeon_e3_1220_v3intel:xeon_e3_1220_v5intel:xeon_e3_1220_v6intel:xeon_e3_1220l_v3intel:xeon_e3_1225intel:xeon_e3_1225_v2intel:xeon_e3_1225_v3intel:xeon_e3_1225_v5intel:xeon_e3_1225_v6intel:xeon_e3_1226_v3intel:xeon_e3_1230intel:xeon_e3_1230_v2intel:xeon_e3_1230_v3intel:xeon_e3_1230_v5intel:xeon_e3_1230_v6intel:xeon_e3_1230l_v3intel:xeon_e3_1231_v3intel:xeon_e3_1235intel:xeon_e3_1235l_v5intel:xeon_e3_1240intel:xeon_e3_1240_v2intel:xeon_e3_1240_v3intel:xeon_e3_1240_v5intel:xeon_e3_1240_v6intel:xeon_e3_1240l_v3intel:xeon_e3_1240l_v5intel:xeon_e3_1241_v3intel:xeon_e3_1245intel:xeon_e3_1245_v2intel:xeon_e3_1245_v3intel:xeon_e3_1245_v5intel:xeon_e3_1245_v6intel:xeon_e3_1246_v3intel:xeon_e3_1258l_v4intel:xeon_e3_1260lintel:xeon_e3_1260l_v5intel:xeon_e3_1265l_v2intel:xeon_e3_1265l_v3intel:xeon_e3_1265l_v4intel:xeon_e3_1268l_v3intel:xeon_e3_1268l_v5intel:xeon_e3_1270intel:xeon_e3_1270_v2intel:xeon_e3_1270_v3intel:xeon_e3_1270_v5intel:xeon_e3_1270_v6intel:xeon_e3_1271_v3intel:xeon_e3_1275_v2intel:xeon_e3_1275_v3intel:xeon_e3_1275_v5intel:xeon_e3_1275_v6intel:xeon_e3_1275l_v3intel:xeon_e3_1276_v3intel:xeon_e3_1278l_v4intel:xeon_e3_1280intel:xeon_e3_1280_v2intel:xeon_e3_1280_v3intel:xeon_e3_1280_v5intel:xeon_e3_1280_v6intel:xeon_e3_1281_v3intel:xeon_e3_1285_v3intel:xeon_e3_1285_v4intel:xeon_e3_1285_v6intel:xeon_e3_1285l_v3intel:xeon_e3_1285l_v4intel:xeon_e3_1286_v3intel:xeon_e3_1286l_v3intel:xeon_e3_1290intel:xeon_e3_1290_v2intel:xeon_e3_1501l_v6intel:xeon_e3_1501m_v6intel:xeon_e3_1505l_v5intel:xeon_e3_1505l_v6intel:xeon_e3_1505m_v5intel:xeon_e5intel:xeon_e5_1428lintel:xeon_e5_1428l_v2intel:xeon_e5_1428l_v3intel:xeon_e5_1620intel:xeon_e5_1620_v2intel:xeon_e5_1620_v3intel:xeon_e5_1620_v4intel:xeon_e5_1630_v3intel:xeon_e5_1630_v4intel:xeon_e5_1650intel:xeon_e5_1650_v2intel:xeon_e5_1650_v3intel:xeon_e5_1650_v4intel:xeon_e5_1660intel:xeon_e5_1660_v2intel:xeon_e5_1660_v3intel:xeon_e5_1660_v4intel:xeon_e5_1680_v3intel:xeon_e5_1680_v4intel:xeon_e5_2403intel:xeon_e5_2403_v2intel:xeon_e5_2407intel:xeon_e5_2407_v2intel:xeon_e5_2408l_v3intel:xeon_e5_2418lintel:xeon_e5_2418l_v2intel:xeon_e5_2418l_v3intel:xeon_e5_2420intel:xeon_e5_2420_v2intel:xeon_e5_2428lintel:xeon_e5_2428l_v2intel:xeon_e5_2428l_v3intel:xeon_e5_2430intel:xeon_e5_2430_v2intel:xeon_e5_2430lintel:xeon_e5_2430l_v2intel:xeon_e5_2438l_v3intel:xeon_e5_2440intel:xeon_e5_2440_v2intel:xeon_e5_2448lintel:xeon_e5_2448l_v2intel:xeon_e5_2450intel:xeon_e5_2450_v2intel:xeon_e5_2450lintel:xeon_e5_2450l_v2intel:xeon_e5_2470intel:xeon_e5_2470_v2intel:xeon_e5_2603intel:xeon_e5_2603_v2intel:xeon_e5_2603_v3intel:xeon_e5_2603_v4intel:xeon_e5_2608l_v3intel:xeon_e5_2608l_v4intel:xeon_e5_2609intel:xeon_e5_2609_v2intel:xeon_e5_2609_v3intel:xeon_e5_2609_v4intel:xeon_e5_2618l_v2intel:xeon_e5_2618l_v3intel:xeon_e5_2618l_v4intel:xeon_e5_2620intel:xeon_e5_2620_v2intel:xeon_e5_2620_v3intel:xeon_e5_2620_v4intel:xeon_e5_2623_v3intel:xeon_e5_2623_v4intel:xeon_e5_2628l_v2intel:xeon_e5_2628l_v3intel:xeon_e5_2628l_v4intel:xeon_e5_2630intel:xeon_e5_2630_v2intel:xeon_e5_2630_v3intel:xeon_e5_2630_v4intel:xeon_e5_2630lintel:xeon_e5_2630l_v2intel:xeon_e5_2630l_v3intel:xeon_e5_2630l_v4intel:xeon_e5_2637intel:xeon_e5_2637_v2intel:xeon_e5_2637_v3intel:xeon_e5_2637_v4intel:xeon_e5_2640intel:xeon_e5_2640_v2intel:xeon_e5_2640_v3intel:xeon_e5_2640_v4intel:xeon_e5_2643intel:xeon_e5_2643_v2intel:xeon_e5_2643_v3intel:xeon_e5_2643_v4intel:xeon_e5_2648lintel:xeon_e5_2648l_v2intel:xeon_e5_2648l_v3intel:xeon_e5_2648l_v4intel:xeon_e5_2650intel:xeon_e5_2650_v2intel:xeon_e5_2650_v3intel:xeon_e5_2650_v4intel:xeon_e5_2650lintel:xeon_e5_2650l_v2intel:xeon_e5_2650l_v3intel:xeon_e7intel:xeon_goldintel:xeon_platinumintel:xeon_silvermicrosoft:surfacemicrosoft:surface_bookmicrosoft:surface_promicrosoft:surface_pro_with_lte_advancedmicrosoft:surface_studiomicrosoft:windows_10microsoft:windows_7microsoft:windows_8.1microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_server_2016mitel:micloud_management_portalmitel:micollabmitel:mivoic_mx-onemitel:mivoice_5000mitel:mivoice_border_gatewaymitel:mivoice_businessmitel:mivoice_connectmitel:open_integration_gatewaynvidia:jetson_tx1nvidia:jetson_tx2oracle:local_service_management_systemoracle:solarisredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:mrg_realtimeredhat:openstackredhat:virtualizationredhat:virtualization_managerschneider-electric:struxureware_data_center_expertsiemens:itc1500siemens:itc1500_firmwaresiemens:itc1500_prosiemens:itc1500_pro_firmwaresiemens:itc1900siemens:itc1900_firmwaresiemens:itc1900_prosiemens:itc1900_pro_firmwaresiemens:itc2200siemens:itc2200_firmwaresiemens:itc2200_prosiemens:itc2200_pro_firmwaresiemens:ruggedcom_apesiemens:ruggedcom_ape_firmwaresiemens:simatic_et_200_spsiemens:simatic_et_200_sp_firmwaresiemens:simatic_field_pg_m4siemens:simatic_field_pg_m4_firmwaresiemens:simatic_field_pg_m5siemens:simatic_field_pg_m5_firmwaresiemens:simatic_ipc3000_smartsiemens:simatic_ipc3000_smart_firmwaresiemens:simatic_ipc347esiemens:simatic_ipc347e_firmwaresiemens:simatic_ipc427csiemens:simatic_ipc427c_firmwaresiemens:simatic_ipc427dsiemens:simatic_ipc427d_firmwaresiemens:simatic_ipc427esiemens:simatic_ipc427e_firmwaresiemens:simatic_ipc477csiemens:simatic_ipc477c_firmwaresiemens:simatic_ipc477dsiemens:simatic_ipc477d_firmwaresiemens:simatic_ipc477esiemens:simatic_ipc477e_firmwaresiemens:simatic_ipc477e_prosiemens:simatic_ipc477e_pro_firmwaresiemens:simatic_ipc547esiemens:simatic_ipc547e_firmwaresiemens:simatic_ipc547gsiemens:simatic_ipc547g_firmwaresiemens:simatic_ipc627csiemens:simatic_ipc627c_firmwaresiemens:simatic_ipc627dsiemens:simatic_ipc627d_firmwaresiemens:simatic_ipc647csiemens:simatic_ipc647c_firmwaresiemens:simatic_ipc647dsiemens:simatic_ipc647d_firmwaresiemens:simatic_ipc677csiemens:simatic_ipc677c_firmwaresiemens:simatic_ipc677dsiemens:simatic_ipc677d_firmwaresiemens:simatic_ipc827csiemens:simatic_ipc827c_firmwaresiemens:simatic_ipc827dsiemens:simatic_ipc827d_firmwaresiemens:simatic_ipc847csiemens:simatic_ipc847c_firmwaresiemens:simatic_ipc847dsiemens:simatic_ipc847d_firmwaresiemens:simatic_itp1000siemens:simatic_itp1000_firmwaresiemens:simatic_s7-1500siemens:simatic_s7-1500_firmwaresiemens:simotion_p320-4esiemens:simotion_p320-4e_firmwaresiemens:sinema_remote_connectsiemens:sinema_remote_connect_firmwaresiemens:sinumerik_840_d_slsiemens:sinumerik_840_d_sl_firmwaresiemens:sinumerik_pcu_50.5siemens:sinumerik_pcu_50.5_firmwaresiemens:sinumerik_tcu_30.3siemens:sinumerik_tcu_30.3_firmwaresonicwall:cloud_global_management_systemsonicwall:email_securitysonicwall:global_management_systemsonicwall:secure_mobile_accesssonicwall:sonicosvsonicwall:web_application_firewall

Faiblesses (CWE)

CWE-203

References

http://support.lenovo.com/us/en/solutions/LEN-22133(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/06/10/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/06/10/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2020/06/10/5(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/104232(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1040949(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1042004(af854a3a-2127-422b-91ae-364da2661108)
http://xenbits.xen.org/xsa/advisory-263.html(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1629(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1630(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1632(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1633(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1635(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1636(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1637(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1638(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1639(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1640(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1641(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1642(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1643(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1644(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1645(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1646(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1647(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1648(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1649(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1650(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1651(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1652(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1653(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1654(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1655(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1656(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1657(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1658(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1659(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1660(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1661(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1662(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1663(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1664(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1665(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1666(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1667(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1668(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1669(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1674(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1675(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1676(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1686(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1688(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1689(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1690(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1696(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1710(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1711(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1737(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1738(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1826(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1854(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1965(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1967(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:1997(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2001(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2003(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2006(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2060(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2161(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2162(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2164(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2171(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2172(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2216(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2228(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2246(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2250(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2258(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2289(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2309(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2328(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2363(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2364(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2387(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2394(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2396(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:2948(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3396(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3397(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3398(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3399(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3400(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3401(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3402(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3407(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3423(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3424(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2018:3425(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:0148(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:1046(af854a3a-2127-422b-91ae-364da2661108)
https://nvidia.custhelp.com/app/answers/detail/a_id/4787(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Jun/36(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180521-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://support.citrix.com/article/CTX235225(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3651-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3652-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3653-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3653-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3654-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3655-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3655-2/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3679-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3680-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3756-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/3777-3/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4210(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2018/dsa-4273(af854a3a-2127-422b-91ae-364da2661108)
https://www.exploit-db.com/exploits/44695/(af854a3a-2127-422b-91ae-364da2661108)
https://www.kb.cert.org/vuls/id/180049(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.us-cert.gov/ncas/alerts/TA18-141A(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.