Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Project Subscriptions

Vendors Products
Cortex-a Subscribe
Canonical Subscribe
Ubuntu Linux Subscribe
Debian Linux Subscribe
Atom X5-e3930 Subscribe
Atom X5-e3940 Subscribe
Atom X7-e3950 Subscribe
Celeron J Subscribe
Celeron N Subscribe
Core I3 Subscribe
Core I5 Subscribe
Core I7 Subscribe
Pentium Subscribe
Pentium J Subscribe
Pentium Silver Subscribe
Xeon E-1105c Subscribe
Xeon E3 Subscribe
Xeon E3 1105c V2 Subscribe
Xeon E3 1125c V2 Subscribe
Xeon E3 12201 Subscribe
Xeon E3 12201 V2 Subscribe
Xeon E3 1220 V2 Subscribe
Xeon E3 1220 V3 Subscribe
Xeon E3 1220 V5 Subscribe
Xeon E3 1220 V6 Subscribe
Xeon E3 1220l V3 Subscribe
Xeon E3 1225 Subscribe
Xeon E3 1225 V2 Subscribe
Xeon E3 1225 V3 Subscribe
Xeon E3 1225 V5 Subscribe
Xeon E3 1225 V6 Subscribe
Xeon E3 1226 V3 Subscribe
Xeon E3 1230 Subscribe
Xeon E3 1230 V2 Subscribe
Xeon E3 1230 V3 Subscribe
Xeon E3 1230 V5 Subscribe
Xeon E3 1230 V6 Subscribe
Xeon E3 1230l V3 Subscribe
Xeon E3 1231 V3 Subscribe
Xeon E3 1235 Subscribe
Xeon E3 1235l V5 Subscribe
Xeon E3 1240 Subscribe
Xeon E3 1240 V2 Subscribe
Xeon E3 1240 V3 Subscribe
Xeon E3 1240 V5 Subscribe
Xeon E3 1240 V6 Subscribe
Xeon E3 1240l V3 Subscribe
Xeon E3 1240l V5 Subscribe
Xeon E3 1241 V3 Subscribe
Xeon E3 1245 Subscribe
Xeon E3 1245 V2 Subscribe
Xeon E3 1245 V3 Subscribe
Xeon E3 1245 V5 Subscribe
Xeon E3 1245 V6 Subscribe
Xeon E3 1246 V3 Subscribe
Xeon E3 1258l V4 Subscribe
Xeon E3 1260l Subscribe
Xeon E3 1260l V5 Subscribe
Xeon E3 1265l V2 Subscribe
Xeon E3 1265l V3 Subscribe
Xeon E3 1265l V4 Subscribe
Xeon E3 1268l V3 Subscribe
Xeon E3 1268l V5 Subscribe
Xeon E3 1270 Subscribe
Xeon E3 1270 V2 Subscribe
Xeon E3 1270 V3 Subscribe
Xeon E3 1270 V5 Subscribe
Xeon E3 1270 V6 Subscribe
Xeon E3 1271 V3 Subscribe
Xeon E3 1275 V2 Subscribe
Xeon E3 1275 V3 Subscribe
Xeon E3 1275 V5 Subscribe
Xeon E3 1275 V6 Subscribe
Xeon E3 1275l V3 Subscribe
Xeon E3 1276 V3 Subscribe
Xeon E3 1278l V4 Subscribe
Xeon E3 1280 Subscribe
Xeon E3 1280 V2 Subscribe
Xeon E3 1280 V3 Subscribe
Xeon E3 1280 V5 Subscribe
Xeon E3 1280 V6 Subscribe
Xeon E3 1281 V3 Subscribe
Xeon E3 1285 V3 Subscribe
Xeon E3 1285 V4 Subscribe
Xeon E3 1285 V6 Subscribe
Xeon E3 1285l V3 Subscribe
Xeon E3 1285l V4 Subscribe
Xeon E3 1286 V3 Subscribe
Xeon E3 1286l V3 Subscribe
Xeon E3 1290 Subscribe
Xeon E3 1290 V2 Subscribe
Xeon E3 1501l V6 Subscribe
Xeon E3 1501m V6 Subscribe
Xeon E3 1505l V5 Subscribe
Xeon E3 1505l V6 Subscribe
Xeon E3 1505m V5 Subscribe
Xeon E5 Subscribe
Xeon E5 1428l Subscribe
Xeon E5 1428l V2 Subscribe
Xeon E5 1428l V3 Subscribe
Xeon E5 1620 Subscribe
Xeon E5 1620 V2 Subscribe
Xeon E5 1620 V3 Subscribe
Xeon E5 1620 V4 Subscribe
Xeon E5 1630 V3 Subscribe
Xeon E5 1630 V4 Subscribe
Xeon E5 1650 Subscribe
Xeon E5 1650 V2 Subscribe
Xeon E5 1650 V3 Subscribe
Xeon E5 1650 V4 Subscribe
Xeon E5 1660 Subscribe
Xeon E5 1660 V2 Subscribe
Xeon E5 1660 V3 Subscribe
Xeon E5 1660 V4 Subscribe
Xeon E5 1680 V3 Subscribe
Xeon E5 1680 V4 Subscribe
Xeon E5 2403 Subscribe
Xeon E5 2403 V2 Subscribe
Xeon E5 2407 Subscribe
Xeon E5 2407 V2 Subscribe
Xeon E5 2408l V3 Subscribe
Xeon E5 2418l Subscribe
Xeon E5 2418l V2 Subscribe
Xeon E5 2418l V3 Subscribe
Xeon E5 2420 Subscribe
Xeon E5 2420 V2 Subscribe
Xeon E5 2428l Subscribe
Xeon E5 2428l V2 Subscribe
Xeon E5 2428l V3 Subscribe
Xeon E5 2430 Subscribe
Xeon E5 2430 V2 Subscribe
Xeon E5 2430l Subscribe
Xeon E5 2430l V2 Subscribe
Xeon E5 2438l V3 Subscribe
Xeon E5 2440 Subscribe
Xeon E5 2440 V2 Subscribe
Xeon E5 2448l Subscribe
Xeon E5 2448l V2 Subscribe
Xeon E5 2450 Subscribe
Xeon E5 2450 V2 Subscribe
Xeon E5 2450l Subscribe
Xeon E5 2450l V2 Subscribe
Xeon E5 2470 Subscribe
Xeon E5 2470 V2 Subscribe
Xeon E5 2603 Subscribe
Xeon E5 2603 V2 Subscribe
Xeon E5 2603 V3 Subscribe
Xeon E5 2603 V4 Subscribe
Xeon E5 2608l V3 Subscribe
Xeon E5 2608l V4 Subscribe
Xeon E5 2609 Subscribe
Xeon E5 2609 V2 Subscribe
Xeon E5 2609 V3 Subscribe
Xeon E5 2609 V4 Subscribe
Xeon E5 2618l V2 Subscribe
Xeon E5 2618l V3 Subscribe
Xeon E5 2618l V4 Subscribe
Xeon E5 2620 Subscribe
Xeon E5 2620 V2 Subscribe
Xeon E5 2620 V3 Subscribe
Xeon E5 2620 V4 Subscribe
Xeon E5 2623 V3 Subscribe
Xeon E5 2623 V4 Subscribe
Xeon E5 2628l V2 Subscribe
Xeon E5 2628l V3 Subscribe
Xeon E5 2628l V4 Subscribe
Xeon E5 2630 Subscribe
Xeon E5 2630 V2 Subscribe
Xeon E5 2630 V3 Subscribe
Xeon E5 2630 V4 Subscribe
Xeon E5 2630l Subscribe
Xeon E5 2630l V2 Subscribe
Xeon E5 2630l V3 Subscribe
Xeon E5 2630l V4 Subscribe
Xeon E5 2637 Subscribe
Xeon E5 2637 V2 Subscribe
Xeon E5 2637 V3 Subscribe
Xeon E5 2637 V4 Subscribe
Xeon E5 2640 Subscribe
Xeon E5 2640 V2 Subscribe
Xeon E5 2640 V3 Subscribe
Xeon E5 2640 V4 Subscribe
Xeon E5 2643 Subscribe
Xeon E5 2643 V2 Subscribe
Xeon E5 2643 V3 Subscribe
Xeon E5 2643 V4 Subscribe
Xeon E5 2648l Subscribe
Xeon E5 2648l V2 Subscribe
Xeon E5 2648l V3 Subscribe
Xeon E5 2648l V4 Subscribe
Xeon E5 2650 Subscribe
Xeon E5 2650 V2 Subscribe
Xeon E5 2650 V3 Subscribe
Xeon E5 2650 V4 Subscribe
Xeon E5 2650l Subscribe
Xeon E5 2650l V2 Subscribe
Xeon E5 2650l V3 Subscribe
Xeon E7 Subscribe
Xeon Gold Subscribe
Xeon Platinum Subscribe
Xeon Silver Subscribe
Microsoft Subscribe
Surface Subscribe
Surface Book Subscribe
Surface Pro Subscribe
Surface Pro With Lte Advanced Subscribe
Surface Studio Subscribe
Windows 10 Subscribe
Windows 7 Subscribe
Windows 8.1 Subscribe
Windows Server 2008 Subscribe
Windows Server 2012 Subscribe
Windows Server 2016 Subscribe
Micloud Management Portal Subscribe
Micollab Subscribe
Mivoic Mx-one Subscribe
Mivoice 5000 Subscribe
Mivoice Border Gateway Subscribe
Mivoice Business Subscribe
Mivoice Connect Subscribe
Open Integration Gateway Subscribe
Jetson Tx1 Subscribe
Jetson Tx2 Subscribe
Local Service Management System Subscribe
Solaris Subscribe
Enterprise Linux Subscribe
Enterprise Linux Desktop Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux Server Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server Tus Subscribe
Enterprise Linux Workstation Subscribe
Enterprise Mrg Subscribe
Mrg Realtime Subscribe
Openstack Subscribe
Openstack Els Subscribe
Rhel Aus Subscribe
Rhel E4s Subscribe
Rhel Els Subscribe
Rhel Eus Subscribe
Rhel Extras Rt Subscribe
Rhel Tus Subscribe
Rhev Manager Subscribe
Virtualization Subscribe
Virtualization Manager Subscribe
Schneider-electric Subscribe
Struxureware Data Center Expert Subscribe
Siemens Subscribe
Itc1500 Subscribe
Itc1500 Firmware Subscribe
Itc1500 Pro Subscribe
Itc1500 Pro Firmware Subscribe
Itc1900 Subscribe
Itc1900 Firmware Subscribe
Itc1900 Pro Subscribe
Itc1900 Pro Firmware Subscribe
Itc2200 Subscribe
Itc2200 Firmware Subscribe
Itc2200 Pro Subscribe
Itc2200 Pro Firmware Subscribe
Ruggedcom Ape Subscribe
Ruggedcom Ape Firmware Subscribe
Simatic Et 200 Sp Subscribe
Simatic Et 200 Sp Firmware Subscribe
Simatic Field Pg M4 Subscribe
Simatic Field Pg M4 Firmware Subscribe
Simatic Field Pg M5 Subscribe
Simatic Field Pg M5 Firmware Subscribe
Simatic Ipc3000 Smart Subscribe
Simatic Ipc3000 Smart Firmware Subscribe
Simatic Ipc347e Subscribe
Simatic Ipc347e Firmware Subscribe
Simatic Ipc427c Subscribe
Simatic Ipc427c Firmware Subscribe
Simatic Ipc427d Subscribe
Simatic Ipc427d Firmware Subscribe
Simatic Ipc427e Subscribe
Simatic Ipc427e Firmware Subscribe
Simatic Ipc477c Subscribe
Simatic Ipc477c Firmware Subscribe
Simatic Ipc477d Subscribe
Simatic Ipc477d Firmware Subscribe
Simatic Ipc477e Subscribe
Simatic Ipc477e Firmware Subscribe
Simatic Ipc477e Pro Subscribe
Simatic Ipc477e Pro Firmware Subscribe
Simatic Ipc547e Subscribe
Simatic Ipc547e Firmware Subscribe
Simatic Ipc547g Subscribe
Simatic Ipc547g Firmware Subscribe
Simatic Ipc627c Subscribe
Simatic Ipc627c Firmware Subscribe
Simatic Ipc627d Subscribe
Simatic Ipc627d Firmware Subscribe
Simatic Ipc647c Subscribe
Simatic Ipc647c Firmware Subscribe
Simatic Ipc647d Subscribe
Simatic Ipc647d Firmware Subscribe
Simatic Ipc677c Subscribe
Simatic Ipc677c Firmware Subscribe
Simatic Ipc677d Subscribe
Simatic Ipc677d Firmware Subscribe
Simatic Ipc827c Subscribe
Simatic Ipc827c Firmware Subscribe
Simatic Ipc827d Subscribe
Simatic Ipc827d Firmware Subscribe
Simatic Ipc847c Subscribe
Simatic Ipc847c Firmware Subscribe
Simatic Ipc847d Subscribe
Simatic Ipc847d Firmware Subscribe
Simatic Itp1000 Subscribe
Simatic Itp1000 Firmware Subscribe
Simatic S7-1500 Subscribe
Simatic S7-1500 Firmware Subscribe
Simotion P320-4e Subscribe
Simotion P320-4e Firmware Subscribe
Sinema Remote Connect Subscribe
Sinema Remote Connect Firmware Subscribe
Sinumerik 840 D Sl Subscribe
Sinumerik 840 D Sl Firmware Subscribe
Sinumerik Pcu 50.5 Subscribe
Sinumerik Pcu 50.5 Firmware Subscribe
Sinumerik Tcu 30.3 Subscribe
Sinumerik Tcu 30.3 Firmware Subscribe
Sonicwall Subscribe
Cloud Global Management System Subscribe
Email Security Subscribe
Global Management System Subscribe
Secure Mobile Access Subscribe
Sonicosv Subscribe
Web Application Firewall Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1423-1 linux-4.9 new package
Debian DLA Debian DLA DLA-1446-1 intel-microcode security update
Debian DLA Debian DLA DLA-1506-1 intel-microcode security update
Debian DLA Debian DLA DLA-1715-1 linux-4.9 security update
Debian DLA Debian DLA DLA-1731-1 linux security update
Debian DLA Debian DLA DLA-1731-2 linux regression update
Debian DLA Debian DLA DLA-2323-1 linux-4.19 new package
Debian DSA Debian DSA DSA-4210-1 xen security update
Debian DSA Debian DSA DSA-4273-1 intel-microcode security update
Debian DSA Debian DSA DSA-4273-2 intel-microcode security update
Debian DSA Debian DSA DSA-4469-1 libvirt security update
Ubuntu USN Ubuntu USN USN-3651-1 QEMU update
Ubuntu USN Ubuntu USN USN-3652-1 Linux kernel vulnerability
Ubuntu USN Ubuntu USN USN-3653-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3653-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3654-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3654-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3655-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3655-2 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3679-1 QEMU update
Ubuntu USN Ubuntu USN USN-3680-1 libvirt vulnerability and update
Ubuntu USN Ubuntu USN USN-3756-1 Intel Microcode vulnerabilities
Ubuntu USN Ubuntu USN USN-3777-3 Linux kernel (Azure) vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html cve-icon cve-icon
http://support.lenovo.com/us/en/solutions/LEN-22133 cve-icon cve-icon
http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2020/06/10/1 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2020/06/10/2 cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2020/06/10/5 cve-icon cve-icon
http://www.securityfocus.com/bid/104232 cve-icon cve-icon
http://www.securitytracker.com/id/1040949 cve-icon cve-icon
http://www.securitytracker.com/id/1042004 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-263.html cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1629 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1630 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1632 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1633 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1635 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1636 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1637 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1638 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1639 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1640 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1641 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1642 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1643 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1644 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1645 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1646 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1647 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1648 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1649 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1650 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1651 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1652 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1653 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1654 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1655 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1656 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1657 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1658 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1659 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1660 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1661 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1662 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1663 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1664 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1665 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1666 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1667 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1668 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1669 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1674 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1675 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1676 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1686 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1688 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1689 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1690 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1696 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1710 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1711 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1737 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1738 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1826 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1854 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1965 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1967 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:1997 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2001 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2003 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2006 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2060 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2161 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2162 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2164 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2171 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2172 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2216 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2228 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2246 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2250 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2258 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2289 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2309 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2328 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2363 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2364 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2387 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2394 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2396 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:2948 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3396 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3397 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3398 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3399 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3400 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3401 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3402 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3407 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3423 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3424 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:3425 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:0148 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:1046 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/ssbd cve-icon
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528 cve-icon cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf cve-icon cve-icon
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2018-3639 cve-icon
https://nvidia.custhelp.com/app/answers/detail/a_id/4787 cve-icon cve-icon
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012 cve-icon cve-icon
https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004 cve-icon cve-icon
https://seclists.org/bugtraq/2019/Jun/36 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20180521-0001/ cve-icon cve-icon
https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf cve-icon
https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf cve-icon
https://support.citrix.com/article/CTX235225 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us cve-icon cve-icon
https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel cve-icon cve-icon
https://usn.ubuntu.com/3651-1/ cve-icon cve-icon
https://usn.ubuntu.com/3652-1/ cve-icon cve-icon
https://usn.ubuntu.com/3653-1/ cve-icon cve-icon
https://usn.ubuntu.com/3653-2/ cve-icon cve-icon
https://usn.ubuntu.com/3654-1/ cve-icon cve-icon
https://usn.ubuntu.com/3654-2/ cve-icon cve-icon
https://usn.ubuntu.com/3655-1/ cve-icon cve-icon
https://usn.ubuntu.com/3655-2/ cve-icon cve-icon
https://usn.ubuntu.com/3679-1/ cve-icon cve-icon
https://usn.ubuntu.com/3680-1/ cve-icon cve-icon
https://usn.ubuntu.com/3756-1/ cve-icon cve-icon
https://usn.ubuntu.com/3777-3/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2018-3639 cve-icon
https://www.debian.org/security/2018/dsa-4210 cve-icon cve-icon
https://www.debian.org/security/2018/dsa-4273 cve-icon cve-icon
https://www.exploit-db.com/exploits/44695/ cve-icon cve-icon
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html cve-icon cve-icon cve-icon
https://www.kb.cert.org/vuls/id/180049 cve-icon cve-icon
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpujul2020.html cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html cve-icon cve-icon
https://www.synology.com/support/security/Synology_SA_18_23 cve-icon cve-icon
https://www.us-cert.gov/ncas/alerts/TA18-141A cve-icon cve-icon
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2024-09-16T22:55:27.557Z

Reserved: 2017-12-28T00:00:00.000Z

Link: CVE-2018-3639

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-05-22T12:29:00.250

Modified: 2024-11-21T04:05:48.867

Link: CVE-2018-3639

cve-icon Redhat

Severity : Important

Publid Date: 2018-05-21T21:00:00Z

Links: CVE-2018-3639 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses