漏洞信息详情
AMD、ARM和Intel CPUs 信息泄露漏洞
漏洞简介
AMD、ARM和Intel CPUs等都是不通厂商的CPU(中央处理器)产品。
AMD、ARM和Intel CPUs存在信息泄露漏洞。攻击者可通过实施边信道攻击利用该漏洞获取系统参数。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.intel.com/
https://www.arm.com/
https://www.amd.com/
参考网址
来源:BID
链接:https://www.securityfocus.com/bid/104228
来源:CONFIRM
链接:https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf
来源:CONFIRM
链接:https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006
来源:DEBIAN
链接:https://www.debian.org/security/2018/dsa-4273
来源:CONFIRM
链接:https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV180013
来源:CERT-VN
链接:https://www.kb.cert.org/vuls/id/180049
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20180521-0001/
来源:CONFIRM
链接:https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
来源:UBUNTU
链接:https://usn.ubuntu.com/3756-1/
来源:CONFIRM
链接:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
来源:CONFIRM
链接:https://www.synology.com/support/security/Synology_SA_18_23
来源:CERT
链接:https://www.us-cert.gov/ncas/alerts/TA18-141A
来源:CONFIRM
链接:http://support.lenovo.com/us/en/solutions/LEN-22133
来源:SECTRACK
链接:http://www.securitytracker.com/id/1042004
来源:CONFIRM
链接:https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
来源:CONFIRM
链接:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0005
来源:CONFIRM
链接:https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_us
来源:CONFIRM
链接:http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html
来源:CISCO
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel
来源:SECTRACK
链接:http://www.securitytracker.com/id/1040949
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10885606
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=swg22017294
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10885602
来源:www.ibm.com
链接:http://www.ibm.com/support/docview.wss?uid=ibm10885608
来源:fortiguard.com
链接:https://fortiguard.com/psirt/FG-IR-18-002
来源:security.business.xerox.com
链接:https://security.business.xerox.com/wp-content/uploads/2019/11/cert_XRX19-029_FFPSv2_Win10_SecurityBulletin_Nov2019.pdf
来源:support.lenovo.com
链接:https://support.lenovo.com/us/en/product_security/LEN-22133
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1899.2/
来源:www.huawei.com
链接:https://www.huawei.com/cn/psirt/security-advisories/huawei-sa-20180615-01-cpu-cn
来源:support.lenovo.com
链接:https://support.lenovo.com/us/en/product_security/LEN-30550
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1988/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.1899/
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2019.4343/
受影响实体
- Intel Atom_c:C2308<!--2000-1-1-->
- Intel Atom_c:C3308<!--2000-1-1-->
- Intel Atom_c:C3338<!--2000-1-1-->
- Intel Atom_c:C3508<!--2000-1-1-->
- Intel Atom_c:C3538<!--2000-1-1-->
补丁
暂无
还没有评论,来说两句吧...