Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Changed
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
This CVE is not in the KEV list.
Exploitation poc
Automatable no
Technical Impact partial
Affected Vendors & Products
Vendors | Products |
---|---|
Arm |
|
Canonical |
|
Debian |
|
Intel |
|
Netapp |
|
Oracle |
|
Redhat |
|
Siemens |
|
Configuration 1 [-]
|
Configuration 2 [-]
|
Configuration 3 [-]
|
Configuration 4 [-]
|
Configuration 5 [-]
AND |
|
Configuration 6 [-]
|
Configuration 7 [-]
|
Package | CPE | Advisory | Released Date |
---|---|---|---|
Red Hat Enterprise Linux 5.9 Long Life | |||
kernel-0:2.6.18-348.39.1.el5 | cpe:/o:redhat:rhel_aus:5.9 | RHSA-2018:1252 | 2018-04-25T00:00:00Z |
Red Hat Enterprise Linux 5 Extended Lifecycle Support | |||
kernel-0:2.6.18-430.el5 | cpe:/o:redhat:rhel_els:5 | RHSA-2018:1196 | 2018-04-23T00:00:00Z |
Red Hat Enterprise Linux 6 | |||
kernel-0:2.6.32-696.28.1.el6 | cpe:/o:redhat:enterprise_linux:6 | RHSA-2018:1319 | 2018-05-08T00:00:00Z |
Red Hat Enterprise Linux 6.2 Advanced Update Support | |||
kernel-0:2.6.32-220.76.2.el6 | cpe:/o:redhat:rhel_mission_critical:6.2 | RHSA-2018:0020 | 2018-01-04T00:00:00Z |
Red Hat Enterprise Linux 6.4 Advanced Update Support | |||
kernel-0:2.6.32-358.84.2.el6 | cpe:/o:redhat:rhel_aus:6.4 | RHSA-2018:0018 | 2018-01-04T00:00:00Z |
Red Hat Enterprise Linux 6.5 Advanced Update Support | |||
kernel-0:2.6.32-431.85.2.el6 | cpe:/o:redhat:rhel_aus:6.5 | RHSA-2018:0022 | 2018-01-04T00:00:00Z |
Red Hat Enterprise Linux 6.6 Advanced Update Support | |||
kernel-0:2.6.32-504.64.4.el6 | cpe:/o:redhat:rhel_aus:6.6 | RHSA-2018:0017 | 2018-01-04T00:00:00Z |
Red Hat Enterprise Linux 6.6 Telco Extended Update Support | |||
kernel-0:2.6.32-504.64.4.el6 | cpe:/o:redhat:rhel_tus:6.6 | RHSA-2018:0017 | 2018-01-04T00:00:00Z |
Red Hat Enterprise Linux 6.7 Extended Update Support | |||
kernel-0:2.6.32-573.55.2.el6 | cpe:/o:redhat:rhel_eus:6.7 | RHSA-2018:1346 | 2018-05-08T00:00:00Z |
Red Hat Enterprise Linux 7 | |||
kernel-rt-0:3.10.0-693.11.1.rt56.639.el7 | cpe:/a:redhat:rhel_extras_rt:7 | RHSA-2018:0016 | 2018-01-04T00:00:00Z |
dracut-0:033-502.el7_4.1 | cpe:/o:redhat:enterprise_linux:7 | RHBA-2018:0042 | 2018-01-04T00:00:00Z |
qemu-kvm-ma-10:2.10.0-21.el7 | cpe:/o:redhat:enterprise_linux:7 | RHBA-2018:0831 | 2018-04-10T00:00:00Z |
microcode_ctl-2:2.1-29.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0690 | 2018-04-10T00:00:00Z |
libvirt-0:3.9.0-14.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0704 | 2018-04-10T00:00:00Z |
linux-firmware-0:20180220-62.git6d51311.el7 | cpe:/o:redhat:enterprise_linux:7 | RHEA-2018:0874 | 2018-04-10T00:00:00Z |
qemu-kvm-10:1.5.3-141.el7_4.6 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:0023 | 2018-01-04T00:00:00Z |
kernel-0:3.10.0-862.el7 | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:1062 | 2018-04-10T00:00:00Z |
kernel-alt-0:4.14.0-49.8.1.el7a | cpe:/o:redhat:enterprise_linux:7 | RHSA-2018:1967 | 2018-06-26T00:00:00Z |
Red Hat Enterprise Linux 7.2 Advanced Update Support | |||
kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_aus:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
Red Hat Enterprise Linux 7.2 Telco Extended Update Support | |||
kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_tus:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions | |||
kernel-0:3.10.0-327.66.1.el7 | cpe:/o:redhat:rhel_e4s:7.2 | RHSA-2018:1216 | 2018-04-24T00:00:00Z |
Red Hat Enterprise Linux 7.3 Extended Update Support | |||
qemu-kvm-10:1.5.3-126.el7_3.13 | cpe:/o:redhat:rhel_eus:7.3 | RHSA-2018:0027 | 2018-01-04T00:00:00Z |
kernel-0:3.10.0-514.48.1.el7 | cpe:/o:redhat:rhel_eus:7.3 | RHSA-2018:1129 | 2018-04-17T00:00:00Z |
Red Hat Enterprise Linux 7.4 Extended Update Support | |||
kernel-0:3.10.0-693.25.2.el7 | cpe:/o:redhat:rhel_eus:7.4 | RHSA-2018:1130 | 2018-04-17T00:00:00Z |
Red Hat Enterprise MRG 2 | |||
kernel-rt-1:3.10.0-693.11.1.rt56.606.el6rt | cpe:/a:redhat:enterprise_mrg:2:server:el6 | RHSA-2018:0021 | 2018-01-04T00:00:00Z |
RHEV 3.X Hypervisor and Agents for RHEL-7 ELS | |||
qemu-kvm-rhev-10:2.6.0-28.el7_3.15 | cpe:/o:redhat:enterprise_linux:7::hypervisor | RHSA-2018:0028 | 2018-01-04T00:00:00Z |
References
History
Tue, 06 May 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 20 Mar 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:/o:redhat:enterprise_linux:7::hypervisor |

Status: PUBLISHED
Assigner: intel
Published: 2018-01-04T13:00:00.000Z
Updated: 2025-05-06T14:59:36.405Z
Reserved: 2017-02-01T00:00:00.000Z
Link: CVE-2017-5715

Updated: 2024-08-05T15:11:48.456Z

Status : Modified
Published: 2018-01-04T13:29:00.227
Modified: 2025-05-06T15:15:51.640
Link: CVE-2017-5715
