Description
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1787-1 | linux-4.9 security update |
Debian DLA |
DLA-1789-1 | intel-microcode security update |
Debian DLA |
DLA-1789-2 | intel-microcode security update |
Debian DLA |
DLA-1799-1 | linux security update |
Debian DLA |
DLA-1799-2 | linux security update |
Debian DLA |
DLA-1989-1 | linux security update |
Debian DLA |
DLA-1990-1 | linux-4.9 security update |
Debian DSA |
DSA-4444-1 | linux security update |
Debian DSA |
DSA-4447-1 | intel-microcode security update |
Debian DSA |
DSA-4447-2 | intel-microcode security update |
Debian DSA |
DSA-4469-1 | libvirt security update |
Debian DSA |
DSA-4564-1 | linux security update |
Debian DSA |
DSA-4602-1 | xen security update |
EUVD |
EUVD-2018-4105 | Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf |
Ubuntu USN |
USN-3977-1 | Intel Microcode update |
Ubuntu USN |
USN-3977-2 | Intel Microcode update |
Ubuntu USN |
USN-3977-3 | Intel Microcode update |
Ubuntu USN |
USN-3978-1 | QEMU update |
Ubuntu USN |
USN-3979-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3980-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3980-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3981-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3981-2 | Linux kernel (HWE) vulnerabilities |
Ubuntu USN |
USN-3982-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3982-2 | Linux kernel (Xenial HWE) vulnerabilities |
Ubuntu USN |
USN-3983-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3983-2 | Linux kernel (Trusty HWE) vulnerabilities |
Ubuntu USN |
USN-3984-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-3985-1 | libvirt update |
Ubuntu USN |
USN-3985-2 | libvirt update |
References
History
No history.
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Intel
Subscribe
Microarchitectural Load Port Data Sampling
Subscribe
Microarchitectural Load Port Data Sampling Firmware
Subscribe
Redhat
Subscribe
Advanced Virtualization
Subscribe
Enterprise Linux
Subscribe
Enterprise Mrg
Subscribe
Openstack
Subscribe
Rhel Aus
Subscribe
Rhel E4s
Subscribe
Rhel Eus
Subscribe
Rhel Extras Rt
Subscribe
Rhel Tus
Subscribe
Rhev Manager
Subscribe
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-05T08:30:57.404Z
Reserved: 2018-06-11T00:00:00.000Z
Link: CVE-2018-12127
No data.
Status : Modified
Published: 2019-05-30T16:29:00.903
Modified: 2024-11-21T03:44:38.757
Link: CVE-2018-12127
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN