{"containers":{"cna":{"affected":[{"product":"Most Modern Operating Systems","vendor":"Intel Corporation","versions":[{"status":"affected","version":"All"}]}],"datePublic":"2018-01-03T00:00:00.000Z","descriptions":[{"lang":"en","value":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."}],"problemTypes":[{"descriptions":[{"description":"Information Disclosure","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2021-11-19T17:48:07.000Z","orgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","shortName":"intel"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"name":"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"},{"name":"DSA-4187","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2018/dsa-4187"},{"name":"USN-3542-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3542-2/"},{"name":"GLSA-201810-06","tags":["vendor-advisory","x_refsource_GENTOO"],"url":"https://security.gentoo.org/glsa/201810-06"},{"name":"USN-3540-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3540-2/"},{"tags":["x_refsource_CONFIRM"],"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"tags":["x_refsource_CONFIRM"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"name":"USN-3597-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3597-1/"},{"name":"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"},{"name":"SUSE-SU-2018:0012","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"},{"name":"SUSE-SU-2018:0011","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"tags":["x_refsource_MISC"],"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"name":"USN-3580-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3580-1/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.f5.com/csp/article/K91229003"},{"name":"openSUSE-SU-2018:0022","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"},{"name":"DSA-4188","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"https://www.debian.org/security/2018/dsa-4188"},{"name":"RHSA-2018:0292","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"tags":["x_refsource_CONFIRM"],"url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"tags":["x_refsource_MISC"],"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"name":"[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"name":"VU#584653","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/584653"},{"name":"VU#180049","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"https://www.kb.cert.org/vuls/id/180049"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"tags":["x_refsource_CONFIRM"],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"name":"USN-3549-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3549-1/"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.citrix.com/article/CTX231399"},{"tags":["x_refsource_MISC"],"url":"https://spectreattack.com/"},{"tags":["x_refsource_CONFIRM"],"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"tags":["x_refsource_CONFIRM"],"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"name":"1040071","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1040071"},{"name":"102371","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/102371"},{"name":"USN-3597-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3597-2/"},{"tags":["x_refsource_CONFIRM"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"name":"SUSE-SU-2018:0010","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"},{"name":"USN-3540-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3540-1/"},{"name":"20180104 CPU Side-Channel Information Disclosure Vulnerabilities","tags":["vendor-advisory","x_refsource_CISCO"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"name":"USN-3516-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"name":"43427","tags":["exploit","x_refsource_EXPLOIT-DB"],"url":"https://www.exploit-db.com/exploits/43427/"},{"name":"USN-3541-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3541-1/"},{"name":"USN-3541-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3541-2/"},{"name":"USN-3542-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3542-1/"},{"tags":["x_refsource_MISC"],"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"name":"openSUSE-SU-2018:0023","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"name":"[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"name":"[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update","tags":["mailing-list","x_refsource_MLIST"],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"tags":["x_refsource_MISC"],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"name":"20190624 [SECURITY] [DSA 4469-1] libvirt security update","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"https://seclists.org/bugtraq/2019/Jun/36"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"tags":["x_refsource_CONFIRM"],"url":"https://cdrdv2.intel.com/v1/dl/getContent/685359"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@intel.com","DATE_PUBLIC":"2018-01-03T00:00:00","ID":"CVE-2017-5753","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Most Modern Operating Systems","version":{"version_data":[{"version_value":"All"}]}}]},"vendor_name":"Intel Corporation"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Information Disclosure"}]}]},"references":{"reference_data":[{"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609","refsource":"CONFIRM","url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"name":"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"},{"name":"DSA-4187","refsource":"DEBIAN","url":"https://www.debian.org/security/2018/dsa-4187"},{"name":"USN-3542-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3542-2/"},{"name":"GLSA-201810-06","refsource":"GENTOO","url":"https://security.gentoo.org/glsa/201810-06"},{"name":"USN-3540-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3540-2/"},{"name":"https://access.redhat.com/security/vulnerabilities/speculativeexecution","refsource":"CONFIRM","url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"name":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002","refsource":"CONFIRM","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"name":"USN-3597-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3597-1/"},{"name":"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"},{"name":"SUSE-SU-2018:0012","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"},{"name":"SUSE-SU-2018:0011","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"},{"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611","refsource":"CONFIRM","url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"name":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html","refsource":"MISC","url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"name":"https://cert.vde.com/en-us/advisories/vde-2018-002","refsource":"CONFIRM","url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"name":"USN-3580-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3580-1/"},{"name":"https://support.f5.com/csp/article/K91229003","refsource":"CONFIRM","url":"https://support.f5.com/csp/article/K91229003"},{"name":"openSUSE-SU-2018:0022","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"},{"name":"DSA-4188","refsource":"DEBIAN","url":"https://www.debian.org/security/2018/dsa-4188"},{"name":"RHSA-2018:0292","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"name":"http://xenbits.xen.org/xsa/advisory-254.html","refsource":"CONFIRM","url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"name":"https://security.netapp.com/advisory/ntap-20180104-0001/","refsource":"CONFIRM","url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"name":"https://www.synology.com/support/security/Synology_SA_18_01","refsource":"CONFIRM","url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"name":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html","refsource":"MISC","url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"name":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt","refsource":"CONFIRM","url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"name":"[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"},{"name":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability","refsource":"CONFIRM","url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"name":"VU#584653","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/584653"},{"name":"VU#180049","refsource":"CERT-VN","url":"https://www.kb.cert.org/vuls/id/180049"},{"name":"https://cert.vde.com/en-us/advisories/vde-2018-003","refsource":"CONFIRM","url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"name":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes","refsource":"CONFIRM","url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"name":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html","refsource":"CONFIRM","url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"name":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"name":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001","refsource":"CONFIRM","url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"},{"name":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us","refsource":"CONFIRM","url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"name":"USN-3549-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3549-1/"},{"name":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/","refsource":"CONFIRM","url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"name":"https://support.citrix.com/article/CTX231399","refsource":"CONFIRM","url":"https://support.citrix.com/article/CTX231399"},{"name":"https://spectreattack.com/","refsource":"MISC","url":"https://spectreattack.com/"},{"name":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/","refsource":"CONFIRM","url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"name":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/","refsource":"CONFIRM","url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"name":"1040071","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1040071"},{"name":"102371","refsource":"BID","url":"http://www.securityfocus.com/bid/102371"},{"name":"USN-3597-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3597-2/"},{"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614","refsource":"CONFIRM","url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"name":"SUSE-SU-2018:0010","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"},{"name":"USN-3540-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3540-1/"},{"name":"20180104 CPU Side-Channel Information Disclosure Vulnerabilities","refsource":"CISCO","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"name":"USN-3516-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"name":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html","refsource":"CONFIRM","url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"name":"43427","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/43427/"},{"name":"USN-3541-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3541-1/"},{"name":"USN-3541-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3541-2/"},{"name":"USN-3542-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3542-1/"},{"name":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html","refsource":"MISC","url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"name":"https://support.lenovo.com/us/en/solutions/LEN-18282","refsource":"CONFIRM","url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"name":"openSUSE-SU-2018:0023","refsource":"SUSE","url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"},{"name":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613","refsource":"CONFIRM","url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"name":"[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"name":"[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"name":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html","refsource":"MISC","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"name":"20190624 [SECURITY] [DSA 4469-1] libvirt security update","refsource":"BUGTRAQ","url":"https://seclists.org/bugtraq/2019/Jun/36"},{"name":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt","refsource":"CONFIRM","url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"name":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf","refsource":"CONFIRM","url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"name":"https://cdrdv2.intel.com/v1/dl/getContent/685359","refsource":"CONFIRM","url":"https://cdrdv2.intel.com/v1/dl/getContent/685359"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T15:11:48.670Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4609"},{"name":"[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html"},{"name":"DSA-4187","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2018/dsa-4187"},{"name":"USN-3542-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3542-2/"},{"name":"GLSA-201810-06","tags":["vendor-advisory","x_refsource_GENTOO","x_transferred"],"url":"https://security.gentoo.org/glsa/201810-06"},{"name":"USN-3540-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3540-2/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://access.redhat.com/security/vulnerabilities/speculativeexecution"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002"},{"name":"USN-3597-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3597-1/"},{"name":"[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html"},{"name":"SUSE-SU-2018:0012","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html"},{"name":"SUSE-SU-2018:0011","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4611"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert.vde.com/en-us/advisories/vde-2018-002"},{"name":"USN-3580-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3580-1/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.f5.com/csp/article/K91229003"},{"name":"openSUSE-SU-2018:0022","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html"},{"name":"DSA-4188","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"https://www.debian.org/security/2018/dsa-4188"},{"name":"RHSA-2018:0292","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2018:0292"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://xenbits.xen.org/xsa/advisory-254.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://security.netapp.com/advisory/ntap-20180104-0001/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.synology.com/support/security/Synology_SA_18_01"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt"},{"name":"[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability"},{"name":"VU#584653","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/584653"},{"name":"VU#180049","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"https://www.kb.cert.org/vuls/id/180049"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert.vde.com/en-us/advisories/vde-2018-003"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us"},{"name":"USN-3549-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3549-1/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.citrix.com/article/CTX231399"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://spectreattack.com/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/"},{"name":"1040071","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1040071"},{"name":"102371","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/102371"},{"name":"USN-3597-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3597-2/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4614"},{"name":"SUSE-SU-2018:0010","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html"},{"name":"USN-3540-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3540-1/"},{"name":"20180104 CPU Side-Channel Information Disclosure Vulnerabilities","tags":["vendor-advisory","x_refsource_CISCO","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel"},{"name":"USN-3516-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/usn/usn-3516-1/"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html"},{"name":"43427","tags":["exploit","x_refsource_EXPLOIT-DB","x_transferred"],"url":"https://www.exploit-db.com/exploits/43427/"},{"name":"USN-3541-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3541-1/"},{"name":"USN-3541-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3541-2/"},{"name":"USN-3542-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3542-1/"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://support.lenovo.com/us/en/solutions/LEN-18282"},{"name":"openSUSE-SU-2018:0023","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://nvidia.custhelp.com/app/answers/detail/a_id/4613"},{"name":"[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html"},{"name":"[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update","tags":["mailing-list","x_refsource_MLIST","x_transferred"],"url":"https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"name":"20190624 [SECURITY] [DSA 4469-1] libvirt security update","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"https://seclists.org/bugtraq/2019/Jun/36"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://cdrdv2.intel.com/v1/dl/getContent/685359"}]}]},"cveMetadata":{"assignerOrgId":"6dda929c-bb53-4a77-a76d-48e79601a1ce","assignerShortName":"intel","cveId":"CVE-2017-5753","datePublished":"2018-01-04T13:00:00.000Z","dateReserved":"2017-02-01T00:00:00.000Z","dateUpdated":"2024-09-16T22:24:53.960Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}