Description
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Published: 2018-01-04
Score: 5.6 Medium
EPSS: 94.3% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1369-1 linux security update
Debian DLA Debian DLA DLA-1422-1 linux security update
Debian DLA Debian DLA DLA-1422-2 linux security update
Debian DLA Debian DLA DLA-1423-1 linux-4.9 new package
Debian DLA Debian DLA DLA-1731-1 linux security update
Debian DLA Debian DLA DLA-1731-2 linux regression update
Debian DSA Debian DSA DSA-4120-1 linux security update
Debian DSA Debian DSA DSA-4187-1 linux security update
Debian DSA Debian DSA DSA-4188-1 linux security update
Debian DSA Debian DSA DSA-4469-1 libvirt security update
Ubuntu USN Ubuntu USN USN-3516-1 Firefox vulnerabilities
Ubuntu USN Ubuntu USN USN-3521-1 NVIDIA graphics drivers vulnerability
Ubuntu USN Ubuntu USN USN-3530-1 WebKitGTK+ vulnerabilities
Ubuntu USN Ubuntu USN USN-3540-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3540-2 Linux kernel (Xenial HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3541-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3541-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3542-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3542-2 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-3549-1 Linux kernel (KVM) vulnerabilities
Ubuntu USN Ubuntu USN USN-3580-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3597-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-3597-2 Linux kernel (HWE) vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00006.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00008.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00014.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00016.html cve-icon cve-icon
http://nvidia.custhelp.com/app/answers/detail/a_id/4609 cve-icon cve-icon
http://nvidia.custhelp.com/app/answers/detail/a_id/4611 cve-icon cve-icon
http://nvidia.custhelp.com/app/answers/detail/a_id/4613 cve-icon cve-icon
http://nvidia.custhelp.com/app/answers/detail/a_id/4614 cve-icon cve-icon
http://packetstormsecurity.com/files/145645/Spectre-Information-Disclosure-Proof-Of-Concept.html cve-icon cve-icon
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2018-001.txt cve-icon cve-icon
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt cve-icon cve-icon
http://www.kb.cert.org/vuls/id/584653 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html cve-icon cve-icon
http://www.securityfocus.com/bid/102371 cve-icon cve-icon
http://www.securitytracker.com/id/1040071 cve-icon cve-icon
http://xenbits.xen.org/xsa/advisory-254.html cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2018:0292 cve-icon cve-icon
https://access.redhat.com/security/vulnerabilities/speculativeexecution cve-icon cve-icon cve-icon
https://aws.amazon.com/de/security/security-bulletins/AWS-2018-013/ cve-icon cve-icon
https://blog.mozilla.org/security/2018/01/03/mitigations-landing-new-class-timing-attack/ cve-icon cve-icon
https://cdrdv2.intel.com/v1/dl/getContent/685359 cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf cve-icon cve-icon
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2018-002 cve-icon cve-icon
https://cert.vde.com/en-us/advisories/vde-2018-003 cve-icon cve-icon
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability cve-icon cve-icon
https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html cve-icon cve-icon cve-icon
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html cve-icon cve-icon
https://meltdownattack.com cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2017-5753 cve-icon
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180002 cve-icon cve-icon
https://seclists.org/bugtraq/2019/Jun/36 cve-icon cve-icon
https://security.gentoo.org/glsa/201810-06 cve-icon cve-icon
https://security.googleblog.com/2018/01/todays-cpu-vulnerability-what-you-need.html cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20180104-0001/ cve-icon cve-icon
https://spectreattack.com/ cve-icon cve-icon cve-icon
https://support.citrix.com/article/CTX231399 cve-icon cve-icon
https://support.f5.com/csp/article/K91229003 cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03805en_us cve-icon cve-icon
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03871en_us cve-icon cve-icon
https://support.lenovo.com/us/en/solutions/LEN-18282 cve-icon cve-icon
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180104-cpusidechannel cve-icon cve-icon
https://usn.ubuntu.com/3540-1/ cve-icon cve-icon
https://usn.ubuntu.com/3540-2/ cve-icon cve-icon
https://usn.ubuntu.com/3541-1/ cve-icon cve-icon
https://usn.ubuntu.com/3541-2/ cve-icon cve-icon
https://usn.ubuntu.com/3542-1/ cve-icon cve-icon
https://usn.ubuntu.com/3542-2/ cve-icon cve-icon
https://usn.ubuntu.com/3549-1/ cve-icon cve-icon
https://usn.ubuntu.com/3580-1/ cve-icon cve-icon
https://usn.ubuntu.com/3597-1/ cve-icon cve-icon
https://usn.ubuntu.com/3597-2/ cve-icon cve-icon
https://usn.ubuntu.com/usn/usn-3516-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2017-5753 cve-icon
https://www.debian.org/security/2018/dsa-4187 cve-icon cve-icon
https://www.debian.org/security/2018/dsa-4188 cve-icon cve-icon
https://www.exploit-db.com/exploits/43427/ cve-icon cve-icon
https://www.kb.cert.org/vuls/id/180049 cve-icon cve-icon
https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0001 cve-icon cve-icon
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html cve-icon cve-icon
https://www.suse.com/c/suse-addresses-meltdown-spectre-vulnerabilities/ cve-icon cve-icon
https://www.synology.com/support/security/Synology_SA_18_01 cve-icon cve-icon
https://www.vmware.com/us/security/advisories/VMSA-2018-0002.html cve-icon cve-icon
History

Tue, 14 Jan 2025 19:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:* cpe:2.3:o:synology:diskstation_manager:*:*:*:*:*:*:*:*

Subscriptions

Arm Cortex-a12 Cortex-a12 Firmware Cortex-a15 Cortex-a15 Firmware Cortex-a17 Cortex-a17 Firmware Cortex-a57 Cortex-a57 Firmware Cortex-a72 Cortex-a72 Firmware Cortex-a73 Cortex-a73 Firmware Cortex-a75 Cortex-a75 Firmware Cortex-a76 Cortex-a76 Firmware Cortex-a77 Cortex-a77 Firmware Cortex-a78 Cortex-a78 Firmware Cortex-a78ae Cortex-a78ae Firmware Cortex-a8 Cortex-a8 Firmware Cortex-a9 Cortex-a9 Firmware Cortex-r7 Cortex-r7 Firmware Cortex-r8 Cortex-r8 Firmware Cortex-x1 Cortex-x1 Firmware Neoverse N1 Neoverse N1 Firmware Neoverse N2 Neoverse N2 Firmware
Canonical Ubuntu Linux
Debian Debian Linux
Intel Atom C Atom E Atom X3 Atom X5-e3930 Atom X5-e3940 Atom X7-e3950 Atom Z Celeron J Celeron N Core I3 Core I5 Core I7 Core M Core M3 Core M5 Core M7 Pentium J Pentium N Xeon Xeon Bronze 3104 Xeon Bronze 3106 Xeon E-1105c Xeon E3 Xeon E3 1105c V2 Xeon E3 1125c Xeon E3 1125c V2 Xeon E3 1220 Xeon E3 12201 Xeon E3 12201 V2 Xeon E3 1220 V2 Xeon E3 1220 V3 Xeon E3 1220 V5 Xeon E3 1220 V6 Xeon E3 1220l V3 Xeon E3 1225 Xeon E3 1225 V2 Xeon E3 1225 V3 Xeon E3 1225 V5 Xeon E3 1225 V6 Xeon E3 1226 V3 Xeon E3 1230 Xeon E3 1230 V2 Xeon E3 1230 V3 Xeon E3 1230 V5 Xeon E3 1230 V6 Xeon E3 1230l V3 Xeon E3 1231 V3 Xeon E3 1235 Xeon E3 1235l V5 Xeon E3 1240 Xeon E3 1240 V2 Xeon E3 1240 V3 Xeon E3 1240 V5 Xeon E3 1240 V6 Xeon E3 1240l V3 Xeon E3 1240l V5 Xeon E3 1241 V3 Xeon E3 1245 Xeon E3 1245 V2 Xeon E3 1245 V3 Xeon E3 1245 V5 Xeon E3 1245 V6 Xeon E3 1246 V3 Xeon E3 1258l V4 Xeon E3 1260l Xeon E3 1260l V5 Xeon E3 1265l V2 Xeon E3 1265l V3 Xeon E3 1265l V4 Xeon E3 1268l V3 Xeon E3 1268l V5 Xeon E3 1270 Xeon E3 1270 V2 Xeon E3 1270 V3 Xeon E3 1270 V5 Xeon E3 1270 V6 Xeon E3 1271 V3 Xeon E3 1275 Xeon E3 1275 V2 Xeon E3 1275 V3 Xeon E3 1275 V5 Xeon E3 1275 V6 Xeon E3 1275l V3 Xeon E3 1276 V3 Xeon E3 1278l V4 Xeon E3 1280 Xeon E3 1280 V2 Xeon E3 1280 V3 Xeon E3 1280 V5 Xeon E3 1280 V6 Xeon E3 1281 V3 Xeon E3 1285 V3 Xeon E3 1285 V4 Xeon E3 1285 V6 Xeon E3 1285l V3 Xeon E3 1285l V4 Xeon E3 1286 V3 Xeon E3 1286l V3 Xeon E3 1290 Xeon E3 1290 V2 Xeon E3 1501l V6 Xeon E3 1501m V6 Xeon E3 1505l V5 Xeon E3 1505l V6 Xeon E3 1505m V5 Xeon E5 Xeon E5 1428l Xeon E5 1428l V2 Xeon E5 1428l V3 Xeon E5 1620 Xeon E5 1620 V2 Xeon E5 1620 V3 Xeon E5 1620 V4 Xeon E5 1630 V3 Xeon E5 1630 V4 Xeon E5 1650 Xeon E5 1650 V2 Xeon E5 1650 V3 Xeon E5 1650 V4 Xeon E5 1660 Xeon E5 1660 V2 Xeon E5 1660 V3 Xeon E5 1660 V4 Xeon E5 1680 V3 Xeon E5 1680 V4 Xeon E5 2403 Xeon E5 2403 V2 Xeon E5 2407 Xeon E5 2407 V2 Xeon E5 2408l V3 Xeon E5 2418l Xeon E5 2418l V2 Xeon E5 2418l V3 Xeon E5 2420 Xeon E5 2420 V2 Xeon E5 2428l Xeon E5 2428l V2 Xeon E5 2428l V3 Xeon E5 2430 Xeon E5 2430 V2 Xeon E5 2430l Xeon E5 2430l V2 Xeon E5 2438l V3 Xeon E5 2440 Xeon E5 2440 V2 Xeon E5 2448l Xeon E5 2448l V2 Xeon E5 2450 Xeon E5 2450 V2 Xeon E5 2450l Xeon E5 2450l V2 Xeon E5 2470 Xeon E5 2470 V2 Xeon E5 2603 Xeon E5 2603 V2 Xeon E5 2603 V3 Xeon E5 2603 V4 Xeon E5 2608l V3 Xeon E5 2608l V4 Xeon E5 2609 Xeon E5 2609 V2 Xeon E5 2609 V3 Xeon E5 2609 V4 Xeon E5 2618l V2 Xeon E5 2618l V3 Xeon E5 2618l V4 Xeon E5 2620 Xeon E5 2620 V2 Xeon E5 2620 V3 Xeon E5 2620 V4 Xeon E5 2623 V3 Xeon E5 2623 V4 Xeon E5 2628l V2 Xeon E5 2628l V3 Xeon E5 2628l V4 Xeon E5 2630 Xeon E5 2630 V2 Xeon E5 2630 V3 Xeon E5 2630 V4 Xeon E5 2630l Xeon E5 2630l V2 Xeon E5 2630l V3 Xeon E5 2630l V4 Xeon E5 2637 Xeon E5 2637 V2 Xeon E5 2637 V3 Xeon E5 2637 V4 Xeon E5 2640 Xeon E5 2640 V2 Xeon E5 2640 V3 Xeon E5 2640 V4 Xeon E5 2643 Xeon E5 2643 V2 Xeon E5 2643 V3 Xeon E5 2643 V4 Xeon E5 2648l Xeon E5 2648l V2 Xeon E5 2648l V3 Xeon E5 2648l V4 Xeon E5 2650 Xeon E5 2650 V2 Xeon E5 2650 V3 Xeon E5 2650 V4 Xeon E5 2650l Xeon E5 2650l V2 Xeon E5 2650l V3 Xeon E7 Xeon Gold Xeon Phi Xeon Platinum Xeon Silver
Netapp Hci Solidfire
Opensuse Leap
Oracle Local Service Management System Solaris
Pepperl-fuchs Btc12 Btc12 Firmware Btc14 Btc14 Firmware Visunet Rm Shell
Phoenixcontact Bl2 Bpc 1000 Bl2 Bpc 1000 Firmware Bl2 Bpc 2000 Bl2 Bpc 2000 Firmware Bl2 Bpc 7000 Bl2 Bpc 7000 Firmware Bl2 Ppc 1000 Bl2 Ppc 1000 Firmware Bl2 Ppc 2000 Bl2 Ppc 2000 Firmware Bl2 Ppc 7000 Bl2 Ppc 7000 Firmware Bl Bpc 2000 Bl Bpc 2000 Firmware Bl Bpc 2001 Bl Bpc 2001 Firmware Bl Bpc 3000 Bl Bpc 3000 Firmware Bl Bpc 3001 Bl Bpc 3001 Firmware Bl Bpc 7000 Bl Bpc 7000 Firmware Bl Bpc 7001 Bl Bpc 7001 Firmware Bl Ppc12 1000 Bl Ppc12 1000 Firmware Bl Ppc15 1000 Bl Ppc15 1000 Firmware Bl Ppc15 3000 Bl Ppc15 3000 Firmware Bl Ppc15 7000 Bl Ppc15 7000 Firmware Bl Ppc17 1000 Bl Ppc17 1000 Firmware Bl Ppc17 3000 Bl Ppc17 3000 Firmware Bl Ppc17 7000 Bl Ppc17 7000 Firmware Bl Ppc 1000 Bl Ppc 1000 Firmware Bl Ppc 7000 Bl Ppc 7000 Firmware Bl Rackmount 2u Bl Rackmount 2u Firmware Bl Rackmount 4u Bl Rackmount 4u Firmware Dl Ppc15 1000 Dl Ppc15 1000 Firmware Dl Ppc15m 7000 Dl Ppc15m 7000 Firmware Dl Ppc18.5m 7000 Dl Ppc18.5m 7000 Firmware Dl Ppc21.5m 7000 Dl Ppc21.5m 7000 Firmware El Ppc 1000 El Ppc 1000\/m El Ppc 1000\/m Firmware El Ppc 1000\/wt El Ppc 1000\/wt Firmware El Ppc 1000 Firmware Valueline Ipc Valueline Ipc Firmware Vl2 Bpc 1000 Vl2 Bpc 1000 Firmware Vl2 Bpc 2000 Vl2 Bpc 2000 Firmware Vl2 Bpc 3000 Vl2 Bpc 3000 Firmware Vl2 Bpc 7000 Vl2 Bpc 7000 Firmware Vl2 Bpc 9000 Vl2 Bpc 9000 Firmware Vl2 Ppc12 1000 Vl2 Ppc12 1000 Firmware Vl2 Ppc7 1000 Vl2 Ppc7 1000 Firmware Vl2 Ppc9 1000 Vl2 Ppc9 1000 Firmware Vl2 Ppc 1000 Vl2 Ppc 1000 Firmware Vl2 Ppc 2000 Vl2 Ppc 2000 Firmware Vl2 Ppc 3000 Vl2 Ppc 3000 Firmware Vl2 Ppc 7000 Vl2 Ppc 7000 Firmware Vl2 Ppc 9000 Vl2 Ppc 9000 Firmware Vl Bpc 1000 Vl Bpc 1000 Firmware Vl Bpc 2000 Vl Bpc 2000 Firmware Vl Bpc 3000 Vl Bpc 3000 Firmware Vl Ipc P7000 Vl Ipc P7000 Firmware Vl Ppc 2000 Vl Ppc 2000 Firmware Vl Ppc 3000 Vl Ppc 3000 Firmware
Redhat Enterprise Linux Enterprise Mrg Rhel Aus Rhel E4s Rhel Els Rhel Eus Rhel Extras Rt Rhel Mission Critical Rhel Tus
Siemens Simatic Itc1500 Simatic Itc1500 Firmware Simatic Itc1500 Pro Simatic Itc1500 Pro Firmware Simatic Itc1900 Simatic Itc1900 Firmware Simatic Itc1900 Pro Simatic Itc1900 Pro Firmware Simatic Itc2200 Simatic Itc2200 Firmware Simatic Itc2200 Pro Simatic Itc2200 Pro Firmware Simatic Winac Rtx \(f\) 2010 Simatic Winac Rtx \(f\) 2010 Firmware
Suse Suse Linux Enterprise Desktop Suse Linux Enterprise Server Suse Linux Enterprise Software Development Kit
Synology Diskstation Manager Router Manager Skynas Virtual Machine Manager Vs360hd Vs360hd Firmware Vs960hd Vs960hd Firmware
Vmware Esxi Fusion Workstation
cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2024-09-16T22:24:53.960Z

Reserved: 2017-02-01T00:00:00.000Z

Link: CVE-2017-5753

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-01-04T13:29:00.257

Modified: 2025-01-14T19:29:55.853

Link: CVE-2017-5753

cve-icon Redhat

Severity : Important

Publid Date: 2018-01-03T22:00:00Z

Links: CVE-2017-5753 - Bugzilla

cve-icon OpenCVE Enrichment

No data.