CVE-2018-3639 : Détail

CVE-2018-3639

5.5
/
Moyen
39.09%V4
Local
2018-05-22
12h00 +00:00
2024-09-16
22h55 +00:00
Notifications pour un CVE
Restez informé de toutes modifications pour un CVE spécifique.
Gestion des notifications

Descriptions du CVE

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Informations du CVE

Faiblesses connexes

CWE-ID Nom de la faiblesse Source
CWE-203 Observable Discrepancy
The product behaves differently or sends different responses under different circumstances in a way that is observable to an unauthorized actor, which exposes security-relevant information about the state of the product, such as whether a particular operation was successful or not.

Métriques

Métriques Score Gravité CVSS Vecteur Source
V3.1 5.5 MEDIUM CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Base: Exploitabilty Metrics

The Exploitability metrics reflect the characteristics of the thing that is vulnerable, which we refer to formally as the vulnerable component.

Attack Vector

This metric reflects the context by which vulnerability exploitation is possible.

Local

The vulnerable component is not bound to the network stack and the attacker’s path is via read/write/execute capabilities.

Attack Complexity

This metric describes the conditions beyond the attacker’s control that must exist in order to exploit the vulnerability.

Low

Specialized access conditions or extenuating circumstances do not exist. An attacker can expect repeatable success when attacking the vulnerable component.

Privileges Required

This metric describes the level of privileges an attacker must possess before successfully exploiting the vulnerability.

Low

The attacker requires privileges that provide basic user capabilities that could normally affect only settings and files owned by a user. Alternatively, an attacker with Low privileges has the ability to access only non-sensitive resources.

User Interaction

This metric captures the requirement for a human user, other than the attacker, to participate in the successful compromise of the vulnerable component.

None

The vulnerable system can be exploited without interaction from any user.

Base: Scope Metrics

The Scope metric captures whether a vulnerability in one vulnerable component impacts resources in components beyond its security scope.

Scope

Formally, a security authority is a mechanism (e.g., an application, an operating system, firmware, a sandbox environment) that defines and enforces access control in terms of how certain subjects/actors (e.g., human users, processes) can access certain restricted objects/resources (e.g., files, CPU, memory) in a controlled manner. All the subjects and objects under the jurisdiction of a single security authority are considered to be under one security scope. If a vulnerability in a vulnerable component can affect a component which is in a different security scope than the vulnerable component, a Scope change occurs. Intuitively, whenever the impact of a vulnerability breaches a security/trust boundary and impacts components outside the security scope in which vulnerable component resides, a Scope change occurs.

Unchanged

An exploited vulnerability can only affect resources managed by the same security authority. In this case, the vulnerable component and the impacted component are either the same, or both are managed by the same security authority.

Base: Impact Metrics

The Impact metrics capture the effects of a successfully exploited vulnerability on the component that suffers the worst outcome that is most directly and predictably associated with the attack. Analysts should constrain impacts to a reasonable, final outcome which they are confident an attacker is able to achieve.

Confidentiality Impact

This metric measures the impact to the confidentiality of the information resources managed by a software component due to a successfully exploited vulnerability.

High

There is a total loss of confidentiality, resulting in all resources within the impacted component being divulged to the attacker. Alternatively, access to only some restricted information is obtained, but the disclosed information presents a direct, serious impact. For example, an attacker steals the administrator's password, or private encryption keys of a web server.

Integrity Impact

This metric measures the impact to integrity of a successfully exploited vulnerability. Integrity refers to the trustworthiness and veracity of information.

None

There is no loss of integrity within the impacted component.

Availability Impact

This metric measures the impact to the availability of the impacted component resulting from a successfully exploited vulnerability.

None

There is no impact to availability within the impacted component.

Temporal Metrics

The Temporal metrics measure the current state of exploit techniques or code availability, the existence of any patches or workarounds, or the confidence in the description of a vulnerability.

Environmental Metrics

These metrics enable the analyst to customize the CVSS score depending on the importance of the affected IT asset to a user’s organization, measured in terms of Confidentiality, Integrity, and Availability.

nvd@nist.gov
V2 2.1 AV:L/AC:L/Au:N/C:P/I:N/A:N nvd@nist.gov

EPSS

EPSS est un modèle de notation qui prédit la probabilité qu'une vulnérabilité soit exploitée.

Score EPSS

Le modèle EPSS produit un score de probabilité compris entre 0 et 1 (0 et 100 %). Plus la note est élevée, plus la probabilité qu'une vulnérabilité soit exploitée est grande.

Percentile EPSS

Le percentile est utilisé pour classer les CVE en fonction de leur score EPSS. Par exemple, une CVE dans le 95e percentile selon son score EPSS est plus susceptible d'être exploitée que 95 % des autres CVE. Ainsi, le percentile sert à comparer le score EPSS d'une CVE par rapport à d'autres CVE.

Informations sur l'Exploit

Exploit Database EDB-ID : 44695

Date de publication : 2018-05-21 22h00 +00:00
Auteur : Google Security Research
EDB Vérifié : Yes

Products Mentioned

Configuraton 0

Intel>>Atom_c >> Version c2308

Intel>>Atom_c >> Version c3308

Intel>>Atom_c >> Version c3338

Intel>>Atom_c >> Version c3508

Intel>>Atom_c >> Version c3538

Intel>>Atom_c >> Version c3558

Intel>>Atom_c >> Version c3708

Intel>>Atom_c >> Version c3750

Intel>>Atom_c >> Version c3758

Intel>>Atom_c >> Version c3808

Intel>>Atom_c >> Version c3830

Intel>>Atom_c >> Version c3850

Intel>>Atom_c >> Version c3858

Intel>>Atom_c >> Version c3950

Intel>>Atom_c >> Version c3955

Intel>>Atom_c >> Version c3958

Intel>>Atom_e >> Version e3805

Intel>>Atom_e >> Version e3815

Intel>>Atom_e >> Version e3825

Intel>>Atom_e >> Version e3826

Intel>>Atom_e >> Version e3827

Intel>>Atom_e >> Version e3845

Intel>>Atom_x5-e3930 >> Version -

Intel>>Atom_x5-e3940 >> Version -

Intel>>Atom_x7-e3950 >> Version -

Intel>>Atom_z >> Version z2420

Intel>>Atom_z >> Version z2460

Intel>>Atom_z >> Version z2480

Intel>>Atom_z >> Version z2520

Intel>>Atom_z >> Version z2560

Intel>>Atom_z >> Version z2580

Intel>>Atom_z >> Version z2760

Intel>>Atom_z >> Version z3460

Intel>>Atom_z >> Version z3480

Intel>>Atom_z >> Version z3530

Intel>>Atom_z >> Version z3560

Intel>>Atom_z >> Version z3570

Intel>>Atom_z >> Version z3580

Intel>>Atom_z >> Version z3590

Intel>>Atom_z >> Version z3735d

Intel>>Atom_z >> Version z3735e

Intel>>Atom_z >> Version z3735f

Intel>>Atom_z >> Version z3735g

Intel>>Atom_z >> Version z3736f

Intel>>Atom_z >> Version z3736g

Intel>>Atom_z >> Version z3740

Intel>>Atom_z >> Version z3740d

Intel>>Atom_z >> Version z3745

Intel>>Atom_z >> Version z3745d

Intel>>Atom_z >> Version z3770

Intel>>Atom_z >> Version z3770d

Intel>>Atom_z >> Version z3775

Intel>>Atom_z >> Version z3775d

Intel>>Atom_z >> Version z3785

Intel>>Atom_z >> Version z3795

Intel>>Celeron_j >> Version j3455

Intel>>Celeron_j >> Version j4005

Intel>>Celeron_j >> Version j4105

Intel>>Celeron_n >> Version n3450

Intel>>Core_i3 >> Version 32nm

Intel>>Core_i3 >> Version 45nm

Intel>>Core_i5 >> Version 32nm

Intel>>Core_i5 >> Version 45nm

Intel>>Core_i7 >> Version 32nm

Intel>>Core_i7 >> Version 45nm

Intel>>Core_m >> Version 32nm

Intel>>Core_m >> Version 45nm

Intel>>Pentium >> Version n4000

Intel>>Pentium >> Version n4100

Intel>>Pentium >> Version n4200

Intel>>Pentium_j >> Version j4205

Intel>>Pentium_silver >> Version j5005

Intel>>Pentium_silver >> Version n5000

Intel>>Xeon_e-1105c >> Version -

Intel>>Xeon_e3 >> Version 125c_

Intel>>Xeon_e3 >> Version 1220_

Intel>>Xeon_e3 >> Version 1275_

Intel>>Xeon_e3 >> Version 1505m_v6

Intel>>Xeon_e3 >> Version 1515m_v5

Intel>>Xeon_e3 >> Version 1535m_v5

Intel>>Xeon_e3 >> Version 1535m_v6

Intel>>Xeon_e3 >> Version 1545m_v5

Intel>>Xeon_e3 >> Version 1558l_v5

Intel>>Xeon_e3 >> Version 1565l_v5

Intel>>Xeon_e3 >> Version 1575m_v5

Intel>>Xeon_e3 >> Version 1578l_v5

Intel>>Xeon_e3 >> Version 1585_v5

Intel>>Xeon_e3 >> Version 1585l_v5

Intel>>Xeon_e3 >> Version 3600

Intel>>Xeon_e3 >> Version 5600

Intel>>Xeon_e3 >> Version 7500

Intel>>Xeon_e3 >> Version e5502

Intel>>Xeon_e3 >> Version e5503

Intel>>Xeon_e3 >> Version e5504

Intel>>Xeon_e3 >> Version e5506

Intel>>Xeon_e3 >> Version e5507

Intel>>Xeon_e3 >> Version e5520

Intel>>Xeon_e3 >> Version e5530

Intel>>Xeon_e3 >> Version e5540

Intel>>Xeon_e3 >> Version e6510

Intel>>Xeon_e3 >> Version e6540

Intel>>Xeon_e3 >> Version e6550

Intel>>Xeon_e3 >> Version l3403

Intel>>Xeon_e3 >> Version l3406

Intel>>Xeon_e3 >> Version l3426

Intel>>Xeon_e3 >> Version l5506

Intel>>Xeon_e3 >> Version l5508_

Intel>>Xeon_e3 >> Version l5518_

Intel>>Xeon_e3 >> Version l5520

Intel>>Xeon_e3 >> Version l5530

Intel>>Xeon_e3 >> Version w5580

Intel>>Xeon_e3 >> Version w5590

Intel>>Xeon_e3 >> Version x3430

Intel>>Xeon_e3 >> Version x3440

Intel>>Xeon_e3 >> Version x3450

Intel>>Xeon_e3 >> Version x3460

Intel>>Xeon_e3 >> Version x3470

Intel>>Xeon_e3 >> Version x3480

Intel>>Xeon_e3 >> Version x5550

Intel>>Xeon_e3 >> Version x5560

Intel>>Xeon_e3 >> Version x5570

Intel>>Xeon_e3_1105c_v2 >> Version -

Intel>>Xeon_e3_1125c_v2 >> Version -

Intel>>Xeon_e3_1220_v2 >> Version -

Intel>>Xeon_e3_1220_v3 >> Version -

Intel>>Xeon_e3_1220_v5 >> Version -

Intel>>Xeon_e3_1220_v6 >> Version -

Intel>>Xeon_e3_12201 >> Version -

Intel>>Xeon_e3_12201_v2 >> Version -

Intel>>Xeon_e3_1220l_v3 >> Version -

Intel>>Xeon_e3_1225 >> Version -

Intel>>Xeon_e3_1225_v2 >> Version -

Intel>>Xeon_e3_1225_v3 >> Version -

Intel>>Xeon_e3_1225_v5 >> Version -

Intel>>Xeon_e3_1225_v6 >> Version -

Intel>>Xeon_e3_1226_v3 >> Version -

Intel>>Xeon_e3_1230 >> Version -

Intel>>Xeon_e3_1230_v2 >> Version -

Intel>>Xeon_e3_1230_v3 >> Version -

Intel>>Xeon_e3_1230_v5 >> Version -

Intel>>Xeon_e3_1230_v6 >> Version -

Intel>>Xeon_e3_1230l_v3 >> Version -

Intel>>Xeon_e3_1231_v3 >> Version -

Intel>>Xeon_e3_1235 >> Version -

Intel>>Xeon_e3_1235l_v5 >> Version -

Intel>>Xeon_e3_1240 >> Version -

Intel>>Xeon_e3_1240_v2 >> Version -

Intel>>Xeon_e3_1240_v3 >> Version -

Intel>>Xeon_e3_1240_v5 >> Version -

Intel>>Xeon_e3_1240_v6 >> Version -

Intel>>Xeon_e3_1240l_v3 >> Version -

Intel>>Xeon_e3_1240l_v5 >> Version -

Intel>>Xeon_e3_1241_v3 >> Version -

Intel>>Xeon_e3_1245 >> Version -

Intel>>Xeon_e3_1245_v2 >> Version -

Intel>>Xeon_e3_1245_v3 >> Version -

Intel>>Xeon_e3_1245_v5 >> Version -

Intel>>Xeon_e3_1245_v6 >> Version -

Intel>>Xeon_e3_1246_v3 >> Version -

Intel>>Xeon_e3_1258l_v4 >> Version -

Intel>>Xeon_e3_1260l >> Version -

Intel>>Xeon_e3_1260l_v5 >> Version -

Intel>>Xeon_e3_1265l_v2 >> Version -

Intel>>Xeon_e3_1265l_v3 >> Version -

Intel>>Xeon_e3_1265l_v4 >> Version -

Intel>>Xeon_e3_1268l_v3 >> Version -

Intel>>Xeon_e3_1268l_v5 >> Version -

Intel>>Xeon_e3_1270 >> Version -

Intel>>Xeon_e3_1270_v2 >> Version -

Intel>>Xeon_e3_1270_v3 >> Version -

Intel>>Xeon_e3_1270_v5 >> Version -

Intel>>Xeon_e3_1270_v6 >> Version -

Intel>>Xeon_e3_1271_v3 >> Version -

Intel>>Xeon_e3_1275_v2 >> Version -

Intel>>Xeon_e3_1275_v3 >> Version -

Intel>>Xeon_e3_1275_v5 >> Version -

Intel>>Xeon_e3_1275_v6 >> Version -

Intel>>Xeon_e3_1275l_v3 >> Version -

Intel>>Xeon_e3_1276_v3 >> Version -

Intel>>Xeon_e3_1278l_v4 >> Version -

Intel>>Xeon_e3_1280 >> Version -

Intel>>Xeon_e3_1280_v2 >> Version -

Intel>>Xeon_e3_1280_v3 >> Version -

Intel>>Xeon_e3_1280_v5 >> Version -

Intel>>Xeon_e3_1280_v6 >> Version -

Intel>>Xeon_e3_1281_v3 >> Version -

Intel>>Xeon_e3_1285_v3 >> Version -

Intel>>Xeon_e3_1285_v4 >> Version -

Intel>>Xeon_e3_1285_v6 >> Version -

Intel>>Xeon_e3_1285l_v3 >> Version -

Intel>>Xeon_e3_1285l_v4 >> Version -

Intel>>Xeon_e3_1286_v3 >> Version -

Intel>>Xeon_e3_1286l_v3 >> Version -

Intel>>Xeon_e3_1290 >> Version -

Intel>>Xeon_e3_1290_v2 >> Version -

Intel>>Xeon_e3_1501l_v6 >> Version -

Intel>>Xeon_e3_1501m_v6 >> Version -

Intel>>Xeon_e3_1505l_v5 >> Version -

Intel>>Xeon_e3_1505l_v6 >> Version -

Intel>>Xeon_e3_1505m_v5 >> Version -

Intel>>Xeon_e5 >> Version 2650l_v4

Intel>>Xeon_e5 >> Version 2658

Intel>>Xeon_e5 >> Version 2658_v2

Intel>>Xeon_e5 >> Version 2658_v3

Intel>>Xeon_e5 >> Version 2658_v4

Intel>>Xeon_e5 >> Version 2658a_v3

Intel>>Xeon_e5 >> Version 2660

Intel>>Xeon_e5 >> Version 2660_v2

Intel>>Xeon_e5 >> Version 2660_v3

Intel>>Xeon_e5 >> Version 2660_v4

Intel>>Xeon_e5 >> Version 2665

Intel>>Xeon_e5 >> Version 2667

Intel>>Xeon_e5 >> Version 2667_v2

Intel>>Xeon_e5 >> Version 2667_v3

Intel>>Xeon_e5 >> Version 2667_v4

Intel>>Xeon_e5 >> Version 2670

Intel>>Xeon_e5 >> Version 2670_v2

Intel>>Xeon_e5 >> Version 2670_v3

Intel>>Xeon_e5 >> Version 2680

Intel>>Xeon_e5 >> Version 2680_v2

Intel>>Xeon_e5 >> Version 2680_v3

Intel>>Xeon_e5 >> Version 2680_v4

Intel>>Xeon_e5 >> Version 2683_v3

Intel>>Xeon_e5 >> Version 2683_v4

Intel>>Xeon_e5 >> Version 2687w

Intel>>Xeon_e5 >> Version 2687w_v2

Intel>>Xeon_e5 >> Version 2687w_v3

Intel>>Xeon_e5 >> Version 2687w_v4

Intel>>Xeon_e5 >> Version 2690

Intel>>Xeon_e5 >> Version 2690_v2

Intel>>Xeon_e5 >> Version 2690_v3

Intel>>Xeon_e5 >> Version 2690_v4

Intel>>Xeon_e5 >> Version 2695_v2

Intel>>Xeon_e5 >> Version 2695_v3

Intel>>Xeon_e5 >> Version 2695_v4

Intel>>Xeon_e5 >> Version 2697_v2

Intel>>Xeon_e5 >> Version 2697_v3

Intel>>Xeon_e5 >> Version 2697_v4

Intel>>Xeon_e5 >> Version 2697a_v4

Intel>>Xeon_e5 >> Version 2698_v3

Intel>>Xeon_e5 >> Version 2698_v4

Intel>>Xeon_e5 >> Version 2699_v3

Intel>>Xeon_e5 >> Version 2699_v4

Intel>>Xeon_e5 >> Version 2699a_v4

Intel>>Xeon_e5 >> Version 2699r_v4

Intel>>Xeon_e5 >> Version 4603

Intel>>Xeon_e5 >> Version 4603_v2

Intel>>Xeon_e5 >> Version 4607

Intel>>Xeon_e5 >> Version 4607_v2

Intel>>Xeon_e5 >> Version 4610

Intel>>Xeon_e5 >> Version 4610_v2

Intel>>Xeon_e5 >> Version 4610_v3

Intel>>Xeon_e5 >> Version 4610_v4

Intel>>Xeon_e5 >> Version 4617

Intel>>Xeon_e5 >> Version 4620

Intel>>Xeon_e5 >> Version 4620_v2

Intel>>Xeon_e5 >> Version 4620_v3

Intel>>Xeon_e5 >> Version 4620_v4

Intel>>Xeon_e5 >> Version 4624l_v2

Intel>>Xeon_e5 >> Version 4627_v2

Intel>>Xeon_e5 >> Version 4627_v3

Intel>>Xeon_e5 >> Version 4627_v4

Intel>>Xeon_e5 >> Version 4628l_v4

Intel>>Xeon_e5 >> Version 4640

Intel>>Xeon_e5 >> Version 4640_v2

Intel>>Xeon_e5 >> Version 4640_v3

Intel>>Xeon_e5 >> Version 4640_v4

Intel>>Xeon_e5 >> Version 4648_v3

Intel>>Xeon_e5 >> Version 4650

Intel>>Xeon_e5 >> Version 4650_v2

Intel>>Xeon_e5 >> Version 4650_v3

Intel>>Xeon_e5 >> Version 4650_v4

Intel>>Xeon_e5 >> Version 4650l

Intel>>Xeon_e5 >> Version 4655_v3

Intel>>Xeon_e5 >> Version 4655_v4

Intel>>Xeon_e5 >> Version 4657l_v2

Intel>>Xeon_e5 >> Version 4660_v3

Intel>>Xeon_e5 >> Version 4660_v4

Intel>>Xeon_e5 >> Version 4667_v3

Intel>>Xeon_e5 >> Version 4667_v4

Intel>>Xeon_e5 >> Version 4669_v3

Intel>>Xeon_e5 >> Version 4669_v4

Intel>>Xeon_e5_1428l >> Version -

Intel>>Xeon_e5_1428l_v2 >> Version -

Intel>>Xeon_e5_1428l_v3 >> Version -

Intel>>Xeon_e5_1620 >> Version -

Intel>>Xeon_e5_1620_v2 >> Version -

Intel>>Xeon_e5_1620_v3 >> Version -

Intel>>Xeon_e5_1620_v4 >> Version -

Intel>>Xeon_e5_1630_v3 >> Version -

Intel>>Xeon_e5_1630_v4 >> Version -

Intel>>Xeon_e5_1650 >> Version -

Intel>>Xeon_e5_1650_v2 >> Version -

Intel>>Xeon_e5_1650_v3 >> Version -

Intel>>Xeon_e5_1650_v4 >> Version -

Intel>>Xeon_e5_1660 >> Version -

Intel>>Xeon_e5_1660_v2 >> Version -

Intel>>Xeon_e5_1660_v3 >> Version -

Intel>>Xeon_e5_1660_v4 >> Version -

Intel>>Xeon_e5_1680_v3 >> Version -

Intel>>Xeon_e5_1680_v4 >> Version -

Intel>>Xeon_e5_2403 >> Version -

Intel>>Xeon_e5_2403_v2 >> Version -

Intel>>Xeon_e5_2407 >> Version -

Intel>>Xeon_e5_2407_v2 >> Version -

Intel>>Xeon_e5_2408l_v3 >> Version -

Intel>>Xeon_e5_2418l >> Version -

Intel>>Xeon_e5_2418l_v2 >> Version -

Intel>>Xeon_e5_2418l_v3 >> Version -

Intel>>Xeon_e5_2420 >> Version -

Intel>>Xeon_e5_2420_v2 >> Version -

Intel>>Xeon_e5_2428l >> Version -

Intel>>Xeon_e5_2428l_v2 >> Version -

Intel>>Xeon_e5_2428l_v3 >> Version -

Intel>>Xeon_e5_2430 >> Version -

Intel>>Xeon_e5_2430_v2 >> Version -

Intel>>Xeon_e5_2430l >> Version -

Intel>>Xeon_e5_2430l_v2 >> Version -

Intel>>Xeon_e5_2438l_v3 >> Version -

Intel>>Xeon_e5_2440 >> Version -

Intel>>Xeon_e5_2440_v2 >> Version -

Intel>>Xeon_e5_2448l >> Version -

Intel>>Xeon_e5_2448l_v2 >> Version -

Intel>>Xeon_e5_2450 >> Version -

Intel>>Xeon_e5_2450_v2 >> Version -

Intel>>Xeon_e5_2450l >> Version -

Intel>>Xeon_e5_2450l_v2 >> Version -

Intel>>Xeon_e5_2470 >> Version -

Intel>>Xeon_e5_2470_v2 >> Version -

Intel>>Xeon_e5_2603 >> Version -

Intel>>Xeon_e5_2603_v2 >> Version -

Intel>>Xeon_e5_2603_v3 >> Version -

Intel>>Xeon_e5_2603_v4 >> Version -

Intel>>Xeon_e5_2608l_v3 >> Version -

Intel>>Xeon_e5_2608l_v4 >> Version -

Intel>>Xeon_e5_2609 >> Version -

Intel>>Xeon_e5_2609_v2 >> Version -

Intel>>Xeon_e5_2609_v3 >> Version -

Intel>>Xeon_e5_2609_v4 >> Version -

Intel>>Xeon_e5_2618l_v2 >> Version -

Intel>>Xeon_e5_2618l_v3 >> Version -

Intel>>Xeon_e5_2618l_v4 >> Version -

Intel>>Xeon_e5_2620 >> Version -

Intel>>Xeon_e5_2620_v2 >> Version -

Intel>>Xeon_e5_2620_v3 >> Version -

Intel>>Xeon_e5_2620_v4 >> Version -

Intel>>Xeon_e5_2623_v3 >> Version -

Intel>>Xeon_e5_2623_v4 >> Version -

Intel>>Xeon_e5_2628l_v2 >> Version -

Intel>>Xeon_e5_2628l_v3 >> Version -

Intel>>Xeon_e5_2628l_v4 >> Version -

Intel>>Xeon_e5_2630 >> Version -

Intel>>Xeon_e5_2630_v2 >> Version -

Intel>>Xeon_e5_2630_v3 >> Version -

Intel>>Xeon_e5_2630_v4 >> Version -

Intel>>Xeon_e5_2630l >> Version -

Intel>>Xeon_e5_2630l_v2 >> Version -

Intel>>Xeon_e5_2630l_v3 >> Version -

Intel>>Xeon_e5_2630l_v4 >> Version -

Intel>>Xeon_e5_2637 >> Version -

Intel>>Xeon_e5_2637_v2 >> Version -

Intel>>Xeon_e5_2637_v3 >> Version -

Intel>>Xeon_e5_2637_v4 >> Version -

Intel>>Xeon_e5_2640 >> Version -

Intel>>Xeon_e5_2640_v2 >> Version -

Intel>>Xeon_e5_2640_v3 >> Version -

Intel>>Xeon_e5_2640_v4 >> Version -

Intel>>Xeon_e5_2643 >> Version -

Intel>>Xeon_e5_2643_v2 >> Version -

Intel>>Xeon_e5_2643_v3 >> Version -

Intel>>Xeon_e5_2643_v4 >> Version -

Intel>>Xeon_e5_2648l >> Version -

Intel>>Xeon_e5_2648l_v2 >> Version -

Intel>>Xeon_e5_2648l_v3 >> Version -

Intel>>Xeon_e5_2648l_v4 >> Version -

Intel>>Xeon_e5_2650 >> Version -

Intel>>Xeon_e5_2650_v2 >> Version -

Intel>>Xeon_e5_2650_v3 >> Version -

Intel>>Xeon_e5_2650_v4 >> Version -

Intel>>Xeon_e5_2650l >> Version -

Intel>>Xeon_e5_2650l_v2 >> Version -

Intel>>Xeon_e5_2650l_v3 >> Version -

Intel>>Xeon_e7 >> Version 2803

Intel>>Xeon_e7 >> Version 2820

Intel>>Xeon_e7 >> Version 2830

Intel>>Xeon_e7 >> Version 2850

Intel>>Xeon_e7 >> Version 2850_v2

Intel>>Xeon_e7 >> Version 2860

Intel>>Xeon_e7 >> Version 2870

Intel>>Xeon_e7 >> Version 2870_v2

Intel>>Xeon_e7 >> Version 2880_v2

Intel>>Xeon_e7 >> Version 2890_v2

Intel>>Xeon_e7 >> Version 4807

Intel>>Xeon_e7 >> Version 4809_v2

Intel>>Xeon_e7 >> Version 4809_v3

Intel>>Xeon_e7 >> Version 4809_v4

Intel>>Xeon_e7 >> Version 4820

Intel>>Xeon_e7 >> Version 4820_v2

Intel>>Xeon_e7 >> Version 4820_v3

Intel>>Xeon_e7 >> Version 4820_v4

Intel>>Xeon_e7 >> Version 4830

Intel>>Xeon_e7 >> Version 4830_v2

Intel>>Xeon_e7 >> Version 4830_v3

Intel>>Xeon_e7 >> Version 4830_v4

Intel>>Xeon_e7 >> Version 4850

Intel>>Xeon_e7 >> Version 4850_v2

Intel>>Xeon_e7 >> Version 4850_v3

Intel>>Xeon_e7 >> Version 4850_v4

Intel>>Xeon_e7 >> Version 4860

Intel>>Xeon_e7 >> Version 4860_v2

Intel>>Xeon_e7 >> Version 4870

Intel>>Xeon_e7 >> Version 4870_v2

Intel>>Xeon_e7 >> Version 4880_v2

Intel>>Xeon_e7 >> Version 4890_v2

Intel>>Xeon_e7 >> Version 8830

Intel>>Xeon_e7 >> Version 8837

Intel>>Xeon_e7 >> Version 8850

Intel>>Xeon_e7 >> Version 8850_v2

Intel>>Xeon_e7 >> Version 8857_v2

Intel>>Xeon_e7 >> Version 8860

Intel>>Xeon_e7 >> Version 8860_v3

Intel>>Xeon_e7 >> Version 8860_v4

Intel>>Xeon_e7 >> Version 8867_v3

Intel>>Xeon_e7 >> Version 8867_v4

Intel>>Xeon_e7 >> Version 8867l

Intel>>Xeon_e7 >> Version 8870

Intel>>Xeon_e7 >> Version 8870_v2

Intel>>Xeon_e7 >> Version 8870_v3

Intel>>Xeon_e7 >> Version 8870_v4

Intel>>Xeon_e7 >> Version 8880_v2

Intel>>Xeon_e7 >> Version 8880_v3

Intel>>Xeon_e7 >> Version 8880_v4

Intel>>Xeon_e7 >> Version 8880l_v2

Intel>>Xeon_e7 >> Version 8880l_v3

Intel>>Xeon_e7 >> Version 8890_v2

Intel>>Xeon_e7 >> Version 8890_v3

Intel>>Xeon_e7 >> Version 8890_v4

Intel>>Xeon_e7 >> Version 8891_v2

Intel>>Xeon_e7 >> Version 8891_v3

Intel>>Xeon_e7 >> Version 8891_v4

Intel>>Xeon_e7 >> Version 8893_v2

Intel>>Xeon_e7 >> Version 8893_v3

Intel>>Xeon_e7 >> Version 8893_v4

Intel>>Xeon_e7 >> Version 8894_v4

Intel>>Xeon_gold >> Version 5115

Intel>>Xeon_gold >> Version 85115

Intel>>Xeon_gold >> Version 85118

Intel>>Xeon_gold >> Version 85119t

Intel>>Xeon_gold >> Version 85120

Intel>>Xeon_gold >> Version 85120t

Intel>>Xeon_gold >> Version 85122

Intel>>Xeon_gold >> Version 86126

Intel>>Xeon_gold >> Version 86126f

Intel>>Xeon_gold >> Version 86126t

Intel>>Xeon_gold >> Version 86128

Intel>>Xeon_gold >> Version 86130

Intel>>Xeon_gold >> Version 86130f

Intel>>Xeon_gold >> Version 86130t

Intel>>Xeon_gold >> Version 86132

Intel>>Xeon_gold >> Version 86134

Intel>>Xeon_gold >> Version 86134m

Intel>>Xeon_gold >> Version 86136

Intel>>Xeon_gold >> Version 86138

Intel>>Xeon_gold >> Version 86138f

Intel>>Xeon_gold >> Version 86138t

Intel>>Xeon_gold >> Version 86140

Intel>>Xeon_gold >> Version 86140m

Intel>>Xeon_gold >> Version 86142

Intel>>Xeon_gold >> Version 86142f

Intel>>Xeon_gold >> Version 86142m

Intel>>Xeon_gold >> Version 86144

Intel>>Xeon_gold >> Version 86146

Intel>>Xeon_gold >> Version 86148

Intel>>Xeon_gold >> Version 86148f

Intel>>Xeon_gold >> Version 86150

Intel>>Xeon_gold >> Version 86152

Intel>>Xeon_gold >> Version 86154

Intel>>Xeon_platinum >> Version 8153

Intel>>Xeon_platinum >> Version 8156

Intel>>Xeon_platinum >> Version 8158

Intel>>Xeon_platinum >> Version 8160

Intel>>Xeon_platinum >> Version 8160f

Intel>>Xeon_platinum >> Version 8160m

Intel>>Xeon_platinum >> Version 8160t

Intel>>Xeon_platinum >> Version 8164

Intel>>Xeon_platinum >> Version 8168

Intel>>Xeon_platinum >> Version 8170

Intel>>Xeon_platinum >> Version 8170m

Intel>>Xeon_platinum >> Version 8176

Intel>>Xeon_platinum >> Version 8176f

Intel>>Xeon_platinum >> Version 8176m

Intel>>Xeon_platinum >> Version 8180

Intel>>Xeon_silver >> Version 4108

Intel>>Xeon_silver >> Version 4109t

Intel>>Xeon_silver >> Version 4110

Intel>>Xeon_silver >> Version 4112

Intel>>Xeon_silver >> Version 4114

Intel>>Xeon_silver >> Version 4114t

Intel>>Xeon_silver >> Version 4116

Intel>>Xeon_silver >> Version 4116t

Configuraton 0

Arm>>Cortex-a >> Version 15

Arm>>Cortex-a >> Version 57

Arm>>Cortex-a >> Version 72

Configuraton 0

Redhat>>Mrg_realtime >> Version 2.0

Redhat>>Openstack >> Version 7.0

Redhat>>Openstack >> Version 8

Redhat>>Openstack >> Version 9

Redhat>>Openstack >> Version 10

Redhat>>Openstack >> Version 12

Redhat>>Openstack >> Version 13

Redhat>>Virtualization_manager >> Version 4.2

Redhat>>Virtualization_manager >> Version 4.3

Redhat>>Enterprise_linux_desktop >> Version 6.0

Redhat>>Enterprise_linux_desktop >> Version 7.0

Redhat>>Enterprise_linux_eus >> Version 6.7

Redhat>>Enterprise_linux_eus >> Version 7.3

Redhat>>Enterprise_linux_eus >> Version 7.4

Redhat>>Enterprise_linux_eus >> Version 7.5

Redhat>>Enterprise_linux_eus >> Version 7.6

Redhat>>Enterprise_linux_eus >> Version 7.7

Redhat>>Enterprise_linux_server >> Version 6.0

Redhat>>Enterprise_linux_server >> Version 7.0

Redhat>>Enterprise_linux_server_aus >> Version 5.9

Redhat>>Enterprise_linux_server_aus >> Version 6.4

Redhat>>Enterprise_linux_server_aus >> Version 6.5

Redhat>>Enterprise_linux_server_aus >> Version 6.6

Redhat>>Enterprise_linux_server_aus >> Version 7.2

Redhat>>Enterprise_linux_server_aus >> Version 7.3

Redhat>>Enterprise_linux_server_aus >> Version 7.4

Redhat>>Enterprise_linux_server_aus >> Version 7.7

Redhat>>Enterprise_linux_server_tus >> Version 6.6

Redhat>>Enterprise_linux_server_tus >> Version 7.2

Redhat>>Enterprise_linux_server_tus >> Version 7.3

Redhat>>Enterprise_linux_server_tus >> Version 7.4

Redhat>>Enterprise_linux_server_tus >> Version 7.6

Redhat>>Enterprise_linux_server_tus >> Version 7.7

Redhat>>Enterprise_linux_workstation >> Version 6.0

Redhat>>Enterprise_linux_workstation >> Version 7.0

Configuraton 0

Debian>>Debian_linux >> Version 8.0

Debian>>Debian_linux >> Version 9.0

Configuraton 0

Canonical>>Ubuntu_linux >> Version 12.04

Canonical>>Ubuntu_linux >> Version 14.04

Canonical>>Ubuntu_linux >> Version 16.04

Canonical>>Ubuntu_linux >> Version 17.10

Canonical>>Ubuntu_linux >> Version 18.04

Configuraton 0

Siemens>>Itc1500_firmware >> Version To (excluding) 3.1

Siemens>>Itc1500 >> Version 3

Configuraton 0

Siemens>>Itc1500_pro_firmware >> Version To (excluding) 3.1

Siemens>>Itc1500_pro >> Version 3

Configuraton 0

Siemens>>Itc1900_firmware >> Version To (excluding) 3.1

Siemens>>Itc1900 >> Version 3

Configuraton 0

Siemens>>Itc1900_pro_firmware >> Version To (excluding) 3.1

Siemens>>Itc1900_pro >> Version 3

Configuraton 0

Siemens>>Itc2200_firmware >> Version To (excluding) 3.1

Siemens>>Itc2200 >> Version 3

Configuraton 0

Siemens>>Itc2200_pro_firmware >> Version To (excluding) 3.1

Siemens>>Itc2200_pro >> Version 3

Configuraton 0

Oracle>>Local_service_management_system >> Version From (including) 13.0 To (including) 13.3

Oracle>>Solaris >> Version 11

Configuraton 0

Siemens>>Ruggedcom_ape_firmware >> Version -

Siemens>>Ruggedcom_ape >> Version -

Configuraton 0

Siemens>>Simatic_et_200_sp_firmware >> Version To (excluding) 2.6

Siemens>>Simatic_et_200_sp >> Version -

Configuraton 0

Siemens>>Simatic_field_pg_m4_firmware >> Version To (excluding) 18.01.09

Siemens>>Simatic_field_pg_m4 >> Version -

Configuraton 0

Siemens>>Simatic_field_pg_m5_firmware >> Version To (excluding) 22.01.06

Siemens>>Simatic_field_pg_m5 >> Version -

Configuraton 0

Siemens>>Simatic_ipc3000_smart_firmware >> Version To (excluding) 1.5

Siemens>>Simatic_ipc3000_smart >> Version 2

Configuraton 0

Siemens>>Simatic_ipc347e_firmware >> Version To (excluding) 1.5

Siemens>>Simatic_ipc347e >> Version -

Configuraton 0

Siemens>>Simatic_ipc427c_firmware >> Version -

Siemens>>Simatic_ipc427c >> Version -

Configuraton 0

Siemens>>Simatic_ipc427d_firmware >> Version To (excluding) 17.0x.14

Siemens>>Simatic_ipc427d >> Version -

Configuraton 0

Siemens>>Simatic_ipc427e_firmware >> Version To (excluding) 21.01.09

Siemens>>Simatic_ipc427e >> Version -

Configuraton 0

Siemens>>Simatic_ipc477c_firmware >> Version -

Siemens>>Simatic_ipc477c >> Version -

Configuraton 0

Siemens>>Simatic_ipc477d_firmware >> Version To (excluding) 17.0x.14

Siemens>>Simatic_ipc477d >> Version -

Configuraton 0

Siemens>>Simatic_ipc477e_firmware >> Version To (excluding) 21.01.09

Siemens>>Simatic_ipc477e >> Version -

Configuraton 0

Siemens>>Simatic_ipc477e_pro_firmware >> Version To (excluding) 21.01.09

Siemens>>Simatic_ipc477e_pro >> Version -

Configuraton 0

Siemens>>Simatic_ipc547e_firmware >> Version To (excluding) r1.30.0

Siemens>>Simatic_ipc547e >> Version -

Configuraton 0

Siemens>>Simatic_ipc547g_firmware >> Version To (excluding) r1.23.0

Siemens>>Simatic_ipc547g >> Version -

Configuraton 0

Siemens>>Simatic_ipc627c_firmware >> Version To (excluding) 15.02.15

Siemens>>Simatic_ipc627c >> Version -

Configuraton 0

Siemens>>Simatic_ipc627d_firmware >> Version To (excluding) 19.02.11

Siemens>>Simatic_ipc627d >> Version -

Configuraton 0

Siemens>>Simatic_ipc647c_firmware >> Version To (excluding) 15.01.14

Siemens>>Simatic_ipc647c >> Version -

Configuraton 0

Siemens>>Simatic_ipc647d_firmware >> Version To (excluding) 19.01.14

Siemens>>Simatic_ipc647d >> Version -

Configuraton 0

Siemens>>Simatic_ipc677d_firmware >> Version To (excluding) 19.02.11

Siemens>>Simatic_ipc677d >> Version -

Configuraton 0

Siemens>>Simatic_ipc677c_firmware >> Version To (excluding) 15.02.15

Siemens>>Simatic_ipc677c >> Version -

Configuraton 0

Siemens>>Simatic_ipc827c_firmware >> Version To (excluding) 15.02.15

Siemens>>Simatic_ipc827c >> Version -

Configuraton 0

Siemens>>Simatic_ipc827d_firmware >> Version To (excluding) 19.02.11

Siemens>>Simatic_ipc827d >> Version -

Configuraton 0

Siemens>>Simatic_ipc847c_firmware >> Version To (excluding) 15.01.14

Siemens>>Simatic_ipc847c >> Version -

Configuraton 0

Siemens>>Simatic_ipc847d_firmware >> Version To (excluding) 19.01.14

Siemens>>Simatic_ipc847d >> Version -

Configuraton 0

Siemens>>Simatic_itp1000_firmware >> Version To (excluding) 23.01.04

Siemens>>Simatic_itp1000 >> Version -

Configuraton 0

Siemens>>Simatic_s7-1500_firmware >> Version To (excluding) 2.6

Siemens>>Simatic_s7-1500 >> Version -

Configuraton 0

Siemens>>Simotion_p320-4e_firmware >> Version To (excluding) 17.0x.14

Siemens>>Simotion_p320-4e >> Version -

Configuraton 0

Siemens>>Sinumerik_840_d_sl_firmware >> Version -

Siemens>>Sinumerik_840_d_sl >> Version -

Configuraton 0

Siemens>>Sinumerik_pcu_50.5_firmware >> Version To (excluding) 15.02.15

Siemens>>Sinumerik_pcu_50.5 >> Version -

Configuraton 0

Siemens>>Sinumerik_tcu_30.3_firmware >> Version -

Siemens>>Sinumerik_tcu_30.3 >> Version -

Configuraton 0

Siemens>>Sinema_remote_connect_firmware >> Version -

Siemens>>Sinema_remote_connect >> Version -

Configuraton 0

Mitel>>Micloud_management_portal >> Version *

Mitel>>Micollab >> Version -

Mitel>>Mivoic_mx-one >> Version -

Mitel>>Mivoice_5000 >> Version -

Mitel>>Mivoice_border_gateway >> Version -

Mitel>>Mivoice_business >> Version -

Mitel>>Mivoice_connect >> Version -

Mitel>>Open_integration_gateway >> Version -

Configuraton 0

Sonicwall>>Cloud_global_management_system >> Version -

Sonicwall>>Email_security >> Version -

Sonicwall>>Global_management_system >> Version -

Sonicwall>>Secure_mobile_access >> Version -

Sonicwall>>Web_application_firewall >> Version -

Sonicwall>>Sonicosv >> Version -

Configuraton 0

Schneider-electric>>Struxureware_data_center_expert >> Version To (excluding) 7.6.0

Configuraton 0

Redhat>>Virtualization >> Version 4.0

Redhat>>Enterprise_linux >> Version 7.0

Configuraton 0

Nvidia>>Jetson_tx1 >> Version To (excluding) r28.3

Nvidia>>Jetson_tx2 >> Version To (excluding) r28.3

Configuraton 0

Microsoft>>Surface >> Version -

Microsoft>>Surface_book >> Version -

Microsoft>>Surface_book >> Version 2

Microsoft>>Surface_pro >> Version 3

Microsoft>>Surface_pro >> Version 4

Microsoft>>Surface_pro >> Version 1796

Microsoft>>Surface_pro_with_lte_advanced >> Version 1807

Microsoft>>Surface_studio >> Version -

Microsoft>>Windows_10 >> Version -

Microsoft>>Windows_10 >> Version 1607

Microsoft>>Windows_10 >> Version 1703

Microsoft>>Windows_10 >> Version 1709

Microsoft>>Windows_10 >> Version 1803

Microsoft>>Windows_10 >> Version 1809

Microsoft>>Windows_7 >> Version -

Microsoft>>Windows_8.1 >> Version -

Microsoft>>Windows_server_2008 >> Version r2

Microsoft>>Windows_server_2008 >> Version sp2

Microsoft>>Windows_server_2012 >> Version -

Microsoft>>Windows_server_2012 >> Version r2

Microsoft>>Windows_server_2016 >> Version -

Microsoft>>Windows_server_2016 >> Version 1709

Microsoft>>Windows_server_2016 >> Version 1803

Références

https://access.redhat.com/errata/RHSA-2018:1689
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2162
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1641
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3680-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1997
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1665
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3407
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2164
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2001
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3423
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2003
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3654-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1645
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1643
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1652
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3424
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3402
Tags : vendor-advisory, x_refsource_REDHAT
https://www.us-cert.gov/ncas/alerts/TA18-141A
Tags : third-party-advisory, x_refsource_CERT
https://access.redhat.com/errata/RHSA-2018:1656
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1664
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2258
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1688
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1658
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1657
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2289
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1666
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1042004
Tags : vdb-entry, x_refsource_SECTRACK
https://access.redhat.com/errata/RHSA-2018:1675
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1660
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1965
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1661
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1633
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1636
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1854
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2006
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2250
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1040949
Tags : vdb-entry, x_refsource_SECTRACK
https://access.redhat.com/errata/RHSA-2018:3401
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1737
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1826
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3651-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://www.debian.org/security/2018/dsa-4210
Tags : vendor-advisory, x_refsource_DEBIAN
https://www.exploit-db.com/exploits/44695/
Tags : exploit, x_refsource_EXPLOIT-DB
https://access.redhat.com/errata/RHSA-2018:1651
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1638
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1696
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2246
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1644
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1646
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1639
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1668
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1637
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2948
Tags : vendor-advisory, x_refsource_REDHAT
https://www.kb.cert.org/vuls/id/180049
Tags : third-party-advisory, x_refsource_CERT-VN
https://access.redhat.com/errata/RHSA-2018:1686
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2172
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1663
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3652-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1629
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1655
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1640
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1669
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1676
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3425
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2363
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1632
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1650
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2396
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2364
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3653-2/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:2216
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3655-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1649
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2309
Tags : vendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/bid/104232
Tags : vdb-entry, x_refsource_BID
https://access.redhat.com/errata/RHSA-2018:1653
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2171
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1635
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2394
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1710
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1659
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1711
Tags : vendor-advisory, x_refsource_REDHAT
https://www.debian.org/security/2018/dsa-4273
Tags : vendor-advisory, x_refsource_DEBIAN
https://access.redhat.com/errata/RHSA-2018:1738
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1674
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3396
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1667
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3654-2/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1662
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1630
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1647
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1967
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3655-2/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:3399
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2060
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1690
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3653-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:2161
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2328
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1648
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2387
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:0148
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:1654
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3679-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://usn.ubuntu.com/3777-3/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:1642
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3397
Tags : vendor-advisory, x_refsource_REDHAT
https://usn.ubuntu.com/3756-1/
Tags : vendor-advisory, x_refsource_UBUNTU
https://access.redhat.com/errata/RHSA-2018:3398
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:3400
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2018:2228
Tags : vendor-advisory, x_refsource_REDHAT
https://access.redhat.com/errata/RHSA-2019:1046
Tags : vendor-advisory, x_refsource_REDHAT
https://seclists.org/bugtraq/2019/Jun/36
Tags : mailing-list, x_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2020/06/10/1
Tags : mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2020/06/10/2
Tags : mailing-list, x_refsource_MLIST
http://www.openwall.com/lists/oss-security/2020/06/10/5
Tags : mailing-list, x_refsource_MLIST