Required CVE Record Information
Description
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
References 28 Total
- access.redhat.com: RHSA-2019:0483 vendor-advisory
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://security.netapp.com/advisory/ntap-20181126-0001/
- usn.ubuntu.com: USN-3840-1 vendor-advisory
- debian.org: DSA-4355 vendor-advisory
- https://www.tenable.com/security/tns-2018-17
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- security.gentoo.org: GLSA-201903-10 vendor-advisory
- https://www.tenable.com/security/tns-2018-16
- exploit-db.com: 45785 exploit
- lists.debian.org: [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update mailing-list
- https://github.com/bbbrumley/portsmash
- debian.org: DSA-4348 vendor-advisory
- securityfocus.com: 105897 vdb-entry
- https://eprint.iacr.org/2018/1060.pdf
- access.redhat.com: RHSA-2019:0651 vendor-advisory
- access.redhat.com: RHSA-2019:0652 vendor-advisory
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- access.redhat.com: RHSA-2019:2125 vendor-advisory
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS
- access.redhat.com: RHSA-2019:3929 vendor-advisory
- access.redhat.com: RHSA-2019:3933 vendor-advisory
- access.redhat.com: RHSA-2019:3931 vendor-advisory
- access.redhat.com: RHSA-2019:3935 vendor-advisory
- access.redhat.com: RHSA-2019:3932 vendor-advisory
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 28 Total
- access.redhat.com: RHSA-2019:0483 vendor-advisoryx_transferred
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html x_transferred
- https://security.netapp.com/advisory/ntap-20181126-0001/ x_transferred
- usn.ubuntu.com: USN-3840-1 vendor-advisoryx_transferred
- debian.org: DSA-4355 vendor-advisoryx_transferred
- https://www.tenable.com/security/tns-2018-17 x_transferred
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/ x_transferred
- security.gentoo.org: GLSA-201903-10 vendor-advisoryx_transferred
- https://www.tenable.com/security/tns-2018-16 x_transferred
- exploit-db.com: 45785 exploitx_transferred
- lists.debian.org: [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update mailing-listx_transferred
- https://github.com/bbbrumley/portsmash x_transferred
- debian.org: DSA-4348 vendor-advisoryx_transferred
- securityfocus.com: 105897 vdb-entryx_transferred
- https://eprint.iacr.org/2018/1060.pdf x_transferred
- access.redhat.com: RHSA-2019:0651 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:0652 vendor-advisoryx_transferred
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html x_transferred
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html x_transferred
- access.redhat.com: RHSA-2019:2125 vendor-advisoryx_transferred
- https://support.f5.com/csp/article/K49711130?utm_source=f5support&%3Butm_medium=RSS x_transferred
- access.redhat.com: RHSA-2019:3929 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:3933 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:3931 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:3935 vendor-advisoryx_transferred
- access.redhat.com: RHSA-2019:3932 vendor-advisoryx_transferred
- https://www.oracle.com/security-alerts/cpujan2020.html x_transferred
- https://www.oracle.com/security-alerts/cpuapr2020.html x_transferred