Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)
2018-05-23T00:00:00
ID ORACLELINUX_ELSA-2018-1660.NASL Type nessus Reporter This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
From Red Hat Security Advisory 2018:1660 :
An update for qemu-kvm is now available for Red Hat Enterprise Linux
6.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Kernel-based Virtual Machine (KVM) is a full virtualization solution
for Linux on a variety of architectures. The qemu-kvm packages provide
the user-space component for running virtual machines that use KVM.
Security Fix(es) :
An industry-wide issue was found in the way many modern
microprocessor designs have implemented speculative execution of Load
& Store instructions (a commonly used performance optimization). It
relies on the presence of a precisely-defined instruction sequence in
the privileged code as well as the fact that memory read from address
to which a recent memory write has occurred may see an older value and
subsequently cause an update into the microprocessor's data cache even
for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to
read privileged memory by conducting targeted cache side-channel
attacks. (CVE-2018-3639)
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.
Red Hat would like to thank Ken Johnson (Microsoft Security Response
Center) and Jann Horn (Google Project Zero) for reporting this issue.
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Red Hat Security Advisory RHSA-2018:1660 and
# Oracle Linux Security Advisory ELSA-2018-1660 respectively.
#
include("compat.inc");
if (description)
{
script_id(109985);
script_version("1.8");
script_cvs_date("Date: 2019/09/27 13:00:38");
script_cve_id("CVE-2018-3639");
script_xref(name:"RHSA", value:"2018:1660");
script_name(english:"Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:"The remote Oracle Linux host is missing one or more security updates."
);
script_set_attribute(
attribute:"description",
value:
"From Red Hat Security Advisory 2018:1660 :
An update for qemu-kvm is now available for Red Hat Enterprise Linux
6.
Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Kernel-based Virtual Machine (KVM) is a full virtualization solution
for Linux on a variety of architectures. The qemu-kvm packages provide
the user-space component for running virtual machines that use KVM.
Security Fix(es) :
* An industry-wide issue was found in the way many modern
microprocessor designs have implemented speculative execution of Load
& Store instructions (a commonly used performance optimization). It
relies on the presence of a precisely-defined instruction sequence in
the privileged code as well as the fact that memory read from address
to which a recent memory write has occurred may see an older value and
subsequently cause an update into the microprocessor's data cache even
for speculatively executed instructions that never actually commit
(retire). As a result, an unprivileged attacker could use this flaw to
read privileged memory by conducting targeted cache side-channel
attacks. (CVE-2018-3639)
Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation.
Red Hat would like to thank Ken Johnson (Microsoft Security Response
Center) and Jann Horn (Google Project Zero) for reporting this issue."
);
script_set_attribute(
attribute:"see_also",
value:"https://oss.oracle.com/pipermail/el-errata/2018-May/007755.html"
);
script_set_attribute(
attribute:"solution",
value:"Update the affected qemu-kvm packages."
);
script_set_cvss_base_vector("CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:qemu-guest-agent");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:qemu-img");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:qemu-kvm");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:oracle:linux:qemu-kvm-tools");
script_set_attribute(attribute:"cpe", value:"cpe:/o:oracle:linux:6");
script_set_attribute(attribute:"vuln_publication_date", value:"2018/05/22");
script_set_attribute(attribute:"patch_publication_date", value:"2018/05/22");
script_set_attribute(attribute:"plugin_publication_date", value:"2018/05/23");
script_set_attribute(attribute:"in_the_news", value:"true");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Oracle Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/OracleLinux", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/OracleLinux")) audit(AUDIT_OS_NOT, "Oracle Linux");
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || !pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux)", string:release)) audit(AUDIT_OS_NOT, "Oracle Linux");
os_ver = pregmatch(pattern: "Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\.[0-9]+)?)", string:release);
if (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, "Oracle Linux");
os_ver = os_ver[1];
if (! preg(pattern:"^6([^0-9]|$)", string:os_ver)) audit(AUDIT_OS_NOT, "Oracle Linux 6", "Oracle Linux " + os_ver);
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if ("x86_64" >!< cpu && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Oracle Linux", cpu);
flag = 0;
if (rpm_check(release:"EL6", reference:"qemu-guest-agent-0.12.1.2-2.503.el6_9.6")) flag++;
if (rpm_check(release:"EL6", cpu:"x86_64", reference:"qemu-img-0.12.1.2-2.503.el6_9.6")) flag++;
if (rpm_check(release:"EL6", cpu:"x86_64", reference:"qemu-kvm-0.12.1.2-2.503.el6_9.6")) flag++;
if (rpm_check(release:"EL6", cpu:"x86_64", reference:"qemu-kvm-tools-0.12.1.2-2.503.el6_9.6")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else
{
tested = pkg_tests_get();
if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);
else audit(AUDIT_PACKAGE_NOT_INSTALLED, "qemu-guest-agent / qemu-img / qemu-kvm / qemu-kvm-tools");
}
{"id": "ORACLELINUX_ELSA-2018-1660.NASL", "bulletinFamily": "scanner", "title": "Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)", "description": "From Red Hat Security Advisory 2018:1660 :\n\nAn update for qemu-kvm is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "published": "2018-05-23T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "href": "https://www.tenable.com/plugins/nessus/109985", "reporter": "This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://oss.oracle.com/pipermail/el-errata/2018-May/007755.html"], "cvelist": ["CVE-2018-3639"], "type": "nessus", "lastseen": "2021-01-01T04:43:39", "edition": 28, "viewCount": 3, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2018-3639"]}, {"type": "f5", "idList": ["F5:K29146534"]}, {"type": "citrix", "idList": ["CTX235225"]}, {"type": "symantec", "idList": ["SMNTC-104232"]}, {"type": "virtuozzo", "idList": ["VZA-2018-033", "VZA-2018-048", "VZA-2018-032", "VZA-2018-034", "VZA-2018-047"]}, {"type": "nessus", "idList": ["DEBIAN_DSA-4210.NASL", "ORACLELINUX_ELSA-2018-1651.NASL", "REDHAT-RHSA-2018-1738.NASL", "AIX_IJ05818.NASL", "REDHAT-RHSA-2018-3399.NASL", "SL_20180626_QEMU_KVM_ON_SL7_X.NASL", "SLACKWARE_SSA_2018-208-01.NASL", "AIX_IJ05821.NASL", "REDHAT-RHSA-2018-1641.NASL", "AIX_IJ05826.NASL"]}, {"type": "amazon", "idList": ["ALAS2-2018-1037"]}, {"type": "redhat", "idList": ["RHSA-2018:1689", "RHSA-2018:2161", "RHSA-2018:3424", "RHSA-2018:3398", "RHSA-2018:2246", "RHSA-2018:1639", "RHSA-2018:2228", "RHSA-2018:1663", "RHSA-2018:3400", "RHSA-2018:2363"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310875589", "OPENVAS:1361412562310882881", "OPENVAS:1361412562311220181200", "OPENVAS:1361412562310876935", "OPENVAS:1361412562310843799", "OPENVAS:1361412562310851854", "OPENVAS:1361412562311220181267", "OPENVAS:1361412562310852087", "OPENVAS:1361412562311220181192", "OPENVAS:1361412562310882886"]}, {"type": "centos", "idList": ["CESA-2018:1648", "CESA-2018:2001"]}, {"type": "ubuntu", "idList": ["USN-3651-1"]}, {"type": "kaspersky", "idList": ["KLA11030"]}, {"type": "fedora", "idList": ["FEDORA:2C5386075B25", "FEDORA:BCF8D6075EF9", "FEDORA:C8DAB604A066", "FEDORA:89597606D8B2"]}, {"type": "oraclelinux", "idList": ["ELSA-2018-1649", "ELSA-2018-1669", "ELSA-2018-1651"]}, {"type": "zdt", "idList": ["1337DAY-ID-30428"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2018:1621-1"]}], "modified": "2021-01-01T04:43:39", "rev": 2}, "score": {"value": 6.6, "vector": "NONE", "modified": "2021-01-01T04:43:39", "rev": 2}, "vulnersScore": 6.6}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2018:1660 and \n# Oracle Linux Security Advisory ELSA-2018-1660 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109985);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/09/27 13:00:38\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:1660\");\n\n script_name(english:\"Oracle Linux 6 : qemu-kvm (ELSA-2018-1660) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2018:1660 :\n\nAn update for qemu-kvm is now available for Red Hat Enterprise Linux\n6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2018-May/007755.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected qemu-kvm packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-guest-agent\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 6\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL6\", reference:\"qemu-guest-agent-0.12.1.2-2.503.el6_9.6\")) flag++;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"qemu-img-0.12.1.2-2.503.el6_9.6\")) flag++;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"qemu-kvm-0.12.1.2-2.503.el6_9.6\")) flag++;\nif (rpm_check(release:\"EL6\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-0.12.1.2-2.503.el6_9.6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu-guest-agent / qemu-img / qemu-kvm / qemu-kvm-tools\");\n}\n", "naslFamily": "Oracle Linux Local Security Checks", "pluginID": "109985", "cpe": ["cpe:/o:oracle:linux:6", "p-cpe:/a:oracle:linux:qemu-kvm-tools", "p-cpe:/a:oracle:linux:qemu-img", "p-cpe:/a:oracle:linux:qemu-guest-agent", "p-cpe:/a:oracle:linux:qemu-kvm"], "scheme": null, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}}
{"cve": [{"lastseen": "2020-12-09T20:25:43", "description": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.", "edition": 15, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 5.5, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2018-05-22T12:29:00", "title": "CVE-2018-3639", "type": "cve", "cwe": ["CWE-203"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 3.9, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "COMPLETE", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.9, "vectorString": "AV:L/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0", "accessVector": "LOCAL", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2018-3639"], "modified": "2020-09-02T21:15:00", "cpe": ["cpe:/h:intel:xeon_e3_1225_v3:-", "cpe:/h:intel:xeon_e5:2680", "cpe:/h:intel:xeon_e5_2407_v2:-", "cpe:/h:intel:xeon_e3:5600", "cpe:/h:intel:atom_z:z3735e", "cpe:/h:intel:xeon_e5_2448l:-", "cpe:/h:intel:xeon_e5:4648_v3", "cpe:/h:intel:xeon_e5_2620_v2:-", "cpe:/h:intel:xeon_e3_1240_v2:-", "cpe:/h:intel:xeon_gold:86138", "cpe:/h:intel:xeon_e5_2637:-", "cpe:/h:intel:xeon_e5_2618l_v3:-", "cpe:/h:intel:atom_z:z3736g", "cpe:/h:intel:xeon_e5_1660_v3:-", "cpe:/h:intel:xeon_e5_2650l_v3:-", "cpe:/h:intel:xeon_silver:4116t", "cpe:/h:intel:xeon_e3_1270:-", "cpe:/h:intel:xeon_platinum:8176f", "cpe:/h:intel:xeon_e3:7500", "cpe:/h:intel:xeon_e3:x3460", "cpe:/h:intel:xeon_e5:4603_v2", "cpe:/h:intel:xeon_e5:4620", "cpe:/h:intel:xeon_e5_1428l_v3:-", "cpe:/h:intel:core_i7:32nm", "cpe:/h:intel:atom_z:z2460", "cpe:/h:intel:xeon_e7:8867_v4", "cpe:/h:intel:xeon_e3:x3440", "cpe:/h:intel:pentium_silver:j5005", "cpe:/h:intel:xeon_e3_1501l_v6:-", "cpe:/h:intel:xeon_e3_1230l_v3:-", "cpe:/h:intel:xeon_e5:4650_v4", "cpe:/h:intel:xeon_e5:2687w", "cpe:/h:intel:xeon_e5_2623_v4:-", "cpe:/h:intel:atom_c:c3858", "cpe:/h:intel:xeon_e3_1245:-", "cpe:/h:intel:xeon_e5_2470_v2:-", "cpe:/h:intel:xeon_e5_2408l_v3:-", "cpe:/h:intel:xeon_e3:e5520", "cpe:/o:canonical:ubuntu_linux:18.04", "cpe:/o:redhat:enterprise_linux_server_eus:7.4", "cpe:/o:redhat:enterprise_linux_server_eus:6.7", "cpe:/h:intel:xeon_e3_1246_v3:-", "cpe:/h:intel:xeon_e5_2623_v3:-", "cpe:/h:intel:atom_c:c3955", "cpe:/h:intel:xeon_e5_2640_v2:-", "cpe:/h:intel:xeon_platinum:8160m", "cpe:/h:intel:xeon_e3_1265l_v3:-", "cpe:/h:intel:xeon_e7:4830_v3", "cpe:/h:intel:xeon_e5_1428l_v2:-", "cpe:/h:intel:xeon_e3:1545m_v5", "cpe:/h:intel:xeon_e5:2660_v3", "cpe:/h:intel:atom_c:c3808", "cpe:/h:intel:xeon_e5:2695_v2", "cpe:/h:intel:xeon_e5:4650_v2", "cpe:/h:intel:xeon_e3:e5506", "cpe:/a:mitel:mivoice_business:-", "cpe:/o:redhat:enterprise_linux_server_aus:7.3", "cpe:/h:intel:xeon_e5:4640", "cpe:/h:intel:xeon_e5:2667_v3", "cpe:/h:intel:xeon_e5:2683_v4", "cpe:/h:intel:xeon_e5_2440:-", "cpe:/h:intel:xeon_e3_1505l_v6:-", "cpe:/h:intel:xeon_e3:l5530", "cpe:/h:intel:atom_e:e3825", "cpe:/h:intel:atom_c:c3538", "cpe:/h:intel:xeon_e5_1620:-", "cpe:/o:siemens:simatic_ipc477c_firmware:-", "cpe:/h:intel:xeon_e5_2630l_v4:-", "cpe:/h:intel:xeon_e5:2667", "cpe:/h:arm:cortex-a:72", "cpe:/h:intel:xeon_e5:2687w_v4", "cpe:/h:intel:xeon_e3:1535m_v5", "cpe:/h:intel:atom_z:z3740", "cpe:/h:intel:xeon_e5:2680_v3", "cpe:/h:intel:xeon_e7:8857_v2", "cpe:/h:intel:xeon_e5_2628l_v4:-", "cpe:/h:intel:xeon_e5_1660_v2:-", "cpe:/h:intel:xeon_e5:4610_v3", "cpe:/h:intel:xeon_e3:1585_v5", "cpe:/h:intel:xeon_e3_1225_v6:-", "cpe:/h:intel:xeon_e3_1275_v5:-", "cpe:/h:intel:xeon_e3:1275_", "cpe:/h:intel:xeon_e5:2658", "cpe:/h:intel:xeon_gold:86142f", "cpe:/h:intel:xeon_e3_1280_v2:-", "cpe:/h:intel:xeon_e5_2608l_v3:-", "cpe:/h:intel:atom_e:e3826", "cpe:/h:intel:xeon_e5_1660:-", "cpe:/h:intel:xeon_platinum:8170", "cpe:/h:intel:xeon_e5:2697_v4", "cpe:/a:sonicwall:secure_mobile_access:-", "cpe:/h:intel:xeon_e3_1220_v2:-", "cpe:/h:intel:xeon_e5:4640_v2", "cpe:/h:intel:xeon_e5_1620_v4:-", "cpe:/h:intel:xeon_e5:4620_v4", "cpe:/h:intel:xeon_e3_1285l_v3:-", "cpe:/h:intel:core_i3:45nm", "cpe:/h:intel:xeon_e5_2450:-", "cpe:/h:intel:xeon_e5_2640_v4:-", "cpe:/h:intel:xeon_e3_1271_v3:-", "cpe:/h:intel:xeon_e5:4610_v4", "cpe:/h:intel:xeon_e7:8870_v3", "cpe:/h:intel:xeon_e5_2430l_v2:-", "cpe:/h:intel:xeon_e5:2660_v2", "cpe:/h:intel:xeon_gold:86134m", "cpe:/a:sonicwall:global_management_system:-", "cpe:/h:intel:atom_z:z3460", "cpe:/h:intel:xeon_e5_2430:-", "cpe:/h:intel:xeon_e5:2687w_v3", "cpe:/h:intel:atom_c:c3750", "cpe:/h:intel:atom_z:z2580", "cpe:/h:intel:xeon_e7:4820", "cpe:/h:intel:xeon_e5:2680_v4", "cpe:/h:intel:xeon_e5_2643:-", "cpe:/h:intel:xeon_silver:4114t", "cpe:/h:intel:xeon_gold:86130t", "cpe:/h:intel:xeon_e7:8850_v2", "cpe:/h:intel:xeon_silver:4108", "cpe:/h:intel:xeon_e5_1650_v3:-", "cpe:/h:intel:xeon_e3:1535m_v6", "cpe:/h:intel:celeron_j:j3455", "cpe:/h:intel:xeon_silver:4112", "cpe:/h:intel:xeon_e3_1281_v3:-", "cpe:/h:intel:xeon_e3_1280_v3:-", "cpe:/h:intel:celeron_n:n3450", "cpe:/h:intel:xeon_e3:l5506", "cpe:/h:intel:xeon_e7:2820", "cpe:/h:intel:xeon_e7:8880l_v2", "cpe:/h:intel:xeon_e3_1225_v5:-", "cpe:/h:intel:xeon_e5:2697a_v4", "cpe:/h:intel:xeon_e5_2618l_v2:-", "cpe:/h:intel:xeon_e5:4657l_v2", "cpe:/h:intel:xeon_e5_2630_v3:-", "cpe:/h:intel:xeon_e7:8890_v4", "cpe:/h:intel:atom_z:z3795", "cpe:/h:intel:xeon_e5_2428l:-", "cpe:/o:siemens:sinumerik_840_d_sl_firmware:-", "cpe:/o:redhat:enterprise_linux_desktop:6.0", "cpe:/h:intel:xeon_e5:2698_v4", "cpe:/h:intel:xeon_gold:86128", "cpe:/o:debian:debian_linux:8.0", "cpe:/h:intel:atom_z:z2420", "cpe:/a:mitel:mivoice_border_gateway:-", "cpe:/h:intel:xeon_e3:1585l_v5", "cpe:/h:intel:xeon_e5_2650l:-", "cpe:/h:intel:xeon_gold:86142m", "cpe:/o:redhat:enterprise_linux_server_tus:7.4", "cpe:/h:intel:core_i5:32nm", "cpe:/h:intel:xeon_e3_1276_v3:-", "cpe:/h:intel:xeon_e7:4850", "cpe:/h:intel:xeon_e7:8850", "cpe:/h:intel:xeon_gold:86136", "cpe:/h:intel:xeon_e3:e6510", "cpe:/h:intel:xeon_e5_2620_v4:-", "cpe:/h:intel:xeon_e3:1220_", "cpe:/h:intel:xeon_e5:4660_v3", "cpe:/h:intel:xeon_e7:8891_v2", "cpe:/h:intel:xeon_e5:4660_v4", "cpe:/h:intel:xeon_e3:e6540", "cpe:/h:intel:xeon_e7:4860", "cpe:/h:intel:xeon_e5_2630:-", "cpe:/h:intel:xeon_e5_2440_v2:-", "cpe:/h:intel:xeon_e3_12201_v2:-", "cpe:/h:intel:xeon_e3_1270_v3:-", "cpe:/h:intel:xeon_e3_1231_v3:-", "cpe:/h:intel:xeon_e7:8880_v2", "cpe:/h:intel:xeon_e5:4610", "cpe:/h:intel:xeon_e5_2630l_v3:-", "cpe:/h:intel:xeon_e5_1660_v4:-", "cpe:/h:intel:xeon_e3:e5503", "cpe:/h:intel:xeon_e5_2630l_v2:-", "cpe:/h:arm:cortex-a:57", "cpe:/h:intel:xeon_e7:4880_v2", "cpe:/h:intel:xeon_e5_2628l_v3:-", "cpe:/h:intel:pentium_silver:n5000", "cpe:/h:intel:xeon_e3_1501m_v6:-", "cpe:/h:intel:xeon_e5:4620_v2", "cpe:/h:intel:xeon_e7:4870_v2", "cpe:/o:oracle:solaris:11", "cpe:/h:intel:pentium_j:j4205", "cpe:/h:intel:xeon_e3:1505m_v6", "cpe:/h:intel:xeon_e3_1235:-", "cpe:/o:redhat:virtualization:4.2", "cpe:/o:siemens:simatic_ipc427c_firmware:-", "cpe:/h:intel:xeon_e7:4890_v2", "cpe:/o:redhat:enterprise_linux_server_eus:7.3", "cpe:/h:intel:xeon_e7:8870_v4", "cpe:/h:intel:xeon_e3:e6550", "cpe:/h:intel:xeon_e3_1240:-", "cpe:/h:intel:xeon_e3_1230_v3:-", "cpe:/h:intel:atom_z:z3735f", "cpe:/h:intel:xeon_e3_1275_v6:-", "cpe:/h:intel:atom_c:c3830", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/h:intel:xeon_e5_2420_v2:-", "cpe:/h:intel:xeon_e3_1268l_v5:-", "cpe:/h:intel:xeon_e3_1270_v6:-", "cpe:/h:intel:xeon_e5_2609_v4:-", "cpe:/h:intel:xeon_platinum:8164", "cpe:/h:intel:xeon_e7:2803", "cpe:/h:intel:xeon_e3:x3470", "cpe:/h:intel:xeon_platinum:8156", "cpe:/h:intel:xeon_e5_2620:-", "cpe:/h:intel:xeon_e5_2648l:-", "cpe:/o:siemens:sinumerik_tcu_30.3_firmware:-", "cpe:/h:intel:atom_e:e3805", "cpe:/h:intel:xeon_e3_1245_v5:-", "cpe:/h:intel:xeon_e3_1270_v5:-", "cpe:/o:redhat:enterprise_linux_server_tus:7.2", "cpe:/h:intel:xeon_platinum:8168", "cpe:/h:intel:xeon_e3:l3406", "cpe:/h:intel:xeon_e7:2850", "cpe:/h:intel:xeon_e3_1290_v2:-", "cpe:/h:intel:xeon_e7:2850_v2", "cpe:/h:intel:xeon_e5_2448l_v2:-", "cpe:/h:intel:xeon_gold:86132", "cpe:/a:mitel:mivoice_connect:-", "cpe:/h:intel:xeon_e5_2470:-", "cpe:/h:intel:atom_c:c3708", "cpe:/h:intel:xeon_e5_2640_v3:-", "cpe:/h:intel:xeon_e5_2650_v2:-", "cpe:/h:intel:xeon_e5:2687w_v2", "cpe:/h:intel:core_i5:45nm", "cpe:/o:siemens:sinema_remote_connect_firmware:-", "cpe:/h:intel:xeon_e7:8860_v4", "cpe:/h:intel:atom_z:z3745d", "cpe:/h:intel:atom_c:c3958", "cpe:/h:intel:xeon_e7:4850_v4", "cpe:/h:intel:xeon_e5_1630_v3:-", "cpe:/h:intel:xeon_e3_1285_v4:-", "cpe:/h:intel:xeon_gold:86126f", "cpe:/h:intel:xeon_e5_2609_v2:-", "cpe:/h:intel:xeon_e5_2648l_v2:-", "cpe:/h:intel:xeon_e7:8880_v3", "cpe:/h:intel:xeon_e7:8837", "cpe:/h:intel:xeon_gold:86130f", "cpe:/h:intel:xeon_e5_2407:-", "cpe:/h:intel:xeon_e7:8870_v2", "cpe:/h:intel:xeon_gold:86126t", "cpe:/h:intel:xeon_gold:85120t", "cpe:/h:intel:xeon_e3:e5530", "cpe:/h:intel:xeon_e5:2658_v3", "cpe:/h:intel:atom_z:z3740d", "cpe:/h:intel:xeon_e3_1260l:-", "cpe:/h:intel:xeon_e3:1515m_v5", "cpe:/h:intel:xeon_e5_2620_v3:-", "cpe:/h:intel:xeon_e5_2650_v3:-", "cpe:/h:intel:xeon_e5:4667_v4", "cpe:/h:intel:xeon_e5_2637_v2:-", "cpe:/h:intel:xeon_e5_2603_v2:-", "cpe:/h:intel:xeon_e5_2637_v3:-", "cpe:/h:intel:xeon_e5:4617", "cpe:/h:intel:xeon_e5_2603_v3:-", "cpe:/h:intel:xeon_e3_1270_v2:-", "cpe:/o:redhat:enterprise_linux_server_aus:5.9", "cpe:/h:intel:xeon_e7:8830", "cpe:/h:intel:xeon_e5_2403:-", "cpe:/h:intel:xeon_e5_2428l_v2:-", "cpe:/h:intel:xeon_e3_1226_v3:-", "cpe:/h:intel:xeon_e3:e5504", "cpe:/h:intel:xeon_e7:8867_v3", "cpe:/h:intel:xeon_e7:4830", "cpe:/h:intel:xeon_e5:4603", "cpe:/h:intel:atom_c:c3308", "cpe:/h:intel:xeon_e3_1286l_v3:-", "cpe:/h:intel:xeon_e3_1280:-", "cpe:/h:intel:xeon_e5:2683_v3", "cpe:/h:arm:cortex-a:15", "cpe:/h:intel:xeon_e7:8880_v4", "cpe:/h:intel:xeon_e5:2658_v2", "cpe:/o:redhat:enterprise_linux_server_aus:7.4", "cpe:/h:intel:xeon_e3:w5580", "cpe:/h:intel:xeon_e7:8890_v2", "cpe:/h:intel:xeon_e5_1650_v4:-", "cpe:/h:intel:celeron_j:j4005", "cpe:/h:intel:xeon_e3_1240_v6:-", "cpe:/h:intel:xeon_e3:x5570", "cpe:/h:intel:xeon_e7:4820_v3", "cpe:/h:intel:xeon_e3_1240l_v3:-", "cpe:/h:intel:xeon_e5:2699a_v4", "cpe:/h:intel:xeon_e3_1505l_v5:-", "cpe:/h:intel:xeon_e3_1225_v2:-", "cpe:/h:intel:core_m:32nm", "cpe:/h:intel:xeon_platinum:8176m", "cpe:/h:intel:xeon_e3_1240_v3:-", "cpe:/h:intel:xeon_e3:1558l_v5", "cpe:/h:intel:xeon_e5_2418l:-", "cpe:/h:intel:xeon_gold:86148", "cpe:/h:intel:xeon_e3_1290:-", "cpe:/h:intel:xeon_e5_2603_v4:-", "cpe:/h:intel:xeon_e3_1240_v5:-", "cpe:/h:intel:xeon_e3:w5590", "cpe:/h:intel:xeon_e3:l5518_", "cpe:/h:intel:xeon_e5:4627_v2", "cpe:/h:intel:xeon_e5_2403_v2:-", "cpe:/h:intel:xeon_e3_1230_v2:-", "cpe:/h:intel:xeon_e5:2658_v4", "cpe:/h:intel:xeon_e3:l3426", "cpe:/h:intel:xeon_e5_2643_v2:-", "cpe:/h:intel:xeon_e5:2650l_v4", "cpe:/h:intel:xeon_e5:2697_v3", "cpe:/h:intel:xeon_gold:86154", "cpe:/h:intel:xeon_e7:8891_v4", "cpe:/h:intel:xeon_e5_2650:-", "cpe:/h:intel:xeon_e3_1260l_v5:-", "cpe:/h:intel:xeon_e3_1275l_v3:-", "cpe:/h:intel:xeon_e5:2660", "cpe:/h:intel:xeon_e3:125c_", "cpe:/h:intel:core_m:45nm", "cpe:/h:intel:atom_z:z3560", "cpe:/h:intel:xeon_e7:8867l", "cpe:/h:intel:atom_c:c3758", "cpe:/h:intel:xeon_gold:86126", "cpe:/h:intel:xeon_e7:8880l_v3", "cpe:/h:intel:xeon_e5_2420:-", "cpe:/h:intel:xeon_e5:4627_v4", "cpe:/h:intel:xeon_e7:2830", "cpe:/h:intel:xeon_e3_1105c_v2:-", "cpe:/o:redhat:enterprise_linux_server_aus:6.5", "cpe:/h:intel:celeron_j:j4105", "cpe:/h:intel:atom_c:c3508", "cpe:/a:redhat:openstack:9", "cpe:/h:intel:xeon_e5_2450l:-", "cpe:/a:mitel:micloud_management_portal:*", "cpe:/h:intel:xeon_e5_2430l:-", "cpe:/h:intel:xeon_e5_2630l:-", "cpe:/h:intel:xeon_e5_2630_v4:-", "cpe:/h:intel:atom_z:z3580", "cpe:/h:intel:xeon_gold:86140", "cpe:/a:redhat:openstack:12", "cpe:/h:intel:xeon_e3:l5508_", "cpe:/h:intel:xeon_e5:4667_v3", "cpe:/h:intel:xeon_gold:85118", "cpe:/h:intel:xeon_e3_1285_v6:-", "cpe:/h:intel:atom_z:z3770d", "cpe:/h:intel:atom_z:z2560", "cpe:/h:intel:xeon_e5:4650l", "cpe:/h:intel:xeon_e5:2690_v4", "cpe:/h:intel:xeon_e3_1230_v5:-", "cpe:/h:intel:xeon_e7:8894_v4", "cpe:/h:intel:xeon_e7:4820_v2", "cpe:/h:intel:core_i7:45nm", "cpe:/h:intel:xeon_e7:4860_v2", "cpe:/h:intel:atom_c:c2308", "cpe:/h:intel:xeon_e5:2680_v2", "cpe:/h:intel:xeon_e5:4624l_v2", "cpe:/h:intel:xeon_e7:4830_v2", "cpe:/h:intel:xeon_e3:l3403", "cpe:/h:intel:xeon_gold:86140m", "cpe:/h:intel:xeon_e3:x3430", "cpe:/h:intel:xeon_e5:4655_v3", "cpe:/h:intel:xeon_e5_1650:-", "cpe:/h:intel:xeon_e5:2667_v2", "cpe:/h:intel:xeon_e5:4627_v3", "cpe:/h:intel:xeon_e5:4610_v2", "cpe:/h:intel:xeon_gold:85122", "cpe:/h:intel:atom_z:z3480", "cpe:/h:intel:atom_z:z3590", "cpe:/h:intel:xeon_e7:2880_v2", "cpe:/a:sonicwall:web_application_firewall:-", "cpe:/h:intel:xeon_e3:e5502", "cpe:/h:intel:xeon_e5_2428l_v3:-", "cpe:/h:intel:xeon_e7:8893_v2", "cpe:/h:intel:xeon_gold:86130", "cpe:/h:intel:atom_z:z3775d", "cpe:/h:intel:xeon_e3_1220l_v3:-", "cpe:/h:intel:xeon_e5:4640_v3", "cpe:/h:intel:xeon_platinum:8160", "cpe:/h:intel:xeon_e3_1235l_v5:-", "cpe:/h:intel:xeon_e7:4830_v4", "cpe:/h:intel:atom_z:z3745", "cpe:/h:intel:xeon_e7:4870", "cpe:/h:intel:xeon_e3:x5550", "cpe:/h:intel:xeon_platinum:8153", "cpe:/a:mitel:mivoic_mx-one:-", "cpe:/h:intel:xeon_e5_2438l_v3:-", "cpe:/h:intel:xeon_e3_1225:-", "cpe:/h:intel:xeon_gold:85115", "cpe:/h:intel:xeon_e7:2870", "cpe:/h:intel:xeon_e3_1230_v6:-", "cpe:/h:intel:xeon_e5_2643_v4:-", "cpe:/h:intel:xeon_e5_2637_v4:-", "cpe:/h:intel:xeon_gold:86148f", "cpe:/h:intel:xeon_e3_1230:-", "cpe:/h:intel:xeon_platinum:8170m", "cpe:/h:intel:xeon_e5:4628l_v4", "cpe:/h:intel:xeon_e5:4620_v3", "cpe:/h:intel:xeon_e7:8891_v3", "cpe:/h:intel:xeon_e5_2450_v2:-", "cpe:/h:intel:xeon_e5_1620_v3:-", "cpe:/h:intel:atom_z:z2480", "cpe:/h:intel:xeon_e3_1286_v3:-", "cpe:/h:intel:xeon_e5_1620_v2:-", "cpe:/h:intel:xeon_e7:4850_v3", "cpe:/h:intel:xeon_e3:l5520", "cpe:/h:intel:atom_e:e3827", "cpe:/o:redhat:enterprise_linux_server_tus:7.3", "cpe:/h:intel:xeon_platinum:8160f", "cpe:/h:intel:xeon_e7:2870_v2", "cpe:/a:redhat:openstack:8", "cpe:/h:intel:xeon_gold:86152", "cpe:/o:redhat:enterprise_linux_server_aus:7.2", "cpe:/h:intel:xeon_e7:4820_v4", "cpe:/h:intel:xeon_e5:2697_v2", "cpe:/a:mitel:open_integration_gateway:-", "cpe:/h:intel:xeon_e5_2418l_v2:-", "cpe:/h:intel:xeon_e5:2670_v2", "cpe:/h:intel:xeon_e5:2670", "cpe:/h:intel:xeon_e3_1220_v3:-", "cpe:/h:intel:xeon_platinum:8180", "cpe:/h:intel:xeon_e5_2430_v2:-", "cpe:/h:intel:xeon_e5:2695_v4", "cpe:/h:intel:xeon_platinum:8160t", "cpe:/h:intel:xeon_e3:x3450", "cpe:/h:intel:atom_z:z3570", "cpe:/h:intel:xeon_e3_1278l_v4:-", "cpe:/h:intel:xeon_e7:8870", "cpe:/h:intel:xeon_e5:2699_v3", "cpe:/h:intel:xeon_e7:4809_v2", "cpe:/h:intel:xeon_e3_1285_v3:-", "cpe:/h:intel:xeon_e3_1280_v5:-", "cpe:/h:intel:xeon_e7:2860", "cpe:/h:intel:xeon_e5:2698_v3", "cpe:/h:intel:xeon_e5_2650l_v2:-", "cpe:/h:intel:core_i3:32nm", "cpe:/h:intel:xeon_e3_1505m_v5:-", "cpe:/h:intel:xeon_e5:4650", "cpe:/h:intel:atom_e:e3815", "cpe:/h:intel:xeon_e5_2648l_v3:-", "cpe:/h:intel:atom_z:z3775", "cpe:/h:intel:xeon_gold:86134", "cpe:/h:intel:xeon_e3_12201:-", "cpe:/h:intel:xeon_e5_1630_v4:-", "cpe:/h:intel:xeon_gold:86142", "cpe:/h:intel:xeon_e7:4850_v2", "cpe:/h:intel:atom_z:z3735d", "cpe:/h:intel:xeon_e7:4809_v4", "cpe:/h:intel:xeon_e5_2418l_v3:-", "cpe:/h:intel:xeon_e3:e5507", "cpe:/h:intel:pentium:n4100", "cpe:/h:intel:atom_z:z3735g", "cpe:/h:intel:xeon_silver:4116", "cpe:/h:intel:xeon_e3:e5540", "cpe:/h:intel:xeon_e7:8890_v3", "cpe:/o:redhat:enterprise_linux_workstation:6.0", "cpe:/h:intel:xeon_e3_1240l_v5:-", "cpe:/h:intel:xeon_e5_2450l_v2:-", "cpe:/o:redhat:enterprise_linux_server_aus:6.4", "cpe:/h:intel:xeon_e5:4640_v4", "cpe:/h:intel:xeon_e5_2618l_v4:-", "cpe:/h:intel:xeon_e5_2609_v3:-", "cpe:/h:intel:xeon_gold:86144", "cpe:/h:intel:atom_z:z2760", "cpe:/o:redhat:enterprise_linux_server:6.0", "cpe:/h:intel:xeon_e3_1245_v2:-", "cpe:/h:intel:xeon_e7:8893_v3", "cpe:/h:intel:xeon_gold:85120", "cpe:/h:intel:xeon_gold:86138f", "cpe:/h:intel:xeon_e3_1268l_v3:-", "cpe:/h:intel:xeon_e5:2699r_v4", "cpe:/h:intel:xeon_e3_1285l_v4:-", "cpe:/h:intel:xeon_e5:2699_v4", "cpe:/h:intel:xeon_e3_1245_v3:-", "cpe:/h:intel:xeon_e3_1125c_v2:-", "cpe:/h:intel:xeon_e5_2640:-", "cpe:/h:intel:xeon_silver:4114", "cpe:/h:intel:xeon_e5_2648l_v4:-", "cpe:/h:intel:xeon_e3_1265l_v2:-", "cpe:/h:intel:atom_c:c3338", "cpe:/a:sonicwall:email_security:-", "cpe:/h:intel:xeon_gold:86146", "cpe:/h:intel:xeon_e5:4655_v4", "cpe:/h:intel:xeon_e5_2608l_v4:-", "cpe:/h:intel:xeon_e7:2890_v2", "cpe:/h:intel:xeon_e5:4607", "cpe:/h:intel:xeon_e3:1578l_v5", "cpe:/h:intel:xeon_e7:4809_v3", "cpe:/h:intel:xeon_e5:2665", "cpe:/o:redhat:enterprise_linux_server_tus:6.6", "cpe:/h:intel:xeon_e5_1650_v2:-", "cpe:/h:intel:xeon_e5_2603:-", "cpe:/h:intel:xeon_e3_1265l_v4:-", "cpe:/h:intel:pentium:n4200", "cpe:/h:intel:xeon_e5:4607_v2", "cpe:/h:intel:atom_e:e3845", "cpe:/h:intel:atom_c:c3850", "cpe:/a:mitel:mivoice_5000:-", "cpe:/h:intel:xeon_e-1105c:-", "cpe:/h:intel:xeon_e3_1220_v5:-", "cpe:/h:intel:xeon_e7:8860_v3", "cpe:/h:intel:xeon_e5_1680_v3:-", "cpe:/h:intel:atom_z:z3530", "cpe:/h:intel:xeon_e3_1220_v6:-", "cpe:/h:intel:xeon_gold:5115", "cpe:/h:intel:xeon_e5_2630_v2:-", "cpe:/h:intel:atom_c:c3558", "cpe:/h:intel:xeon_e5:2690", "cpe:/h:intel:pentium:n4000", "cpe:/h:intel:xeon_e3_1258l_v4:-", "cpe:/h:intel:xeon_e5_2628l_v2:-", "cpe:/h:intel:xeon_e5:4669_v4", "cpe:/h:intel:atom_z:z3770", "cpe:/a:sonicwall:sonicosv:-", "cpe:/h:intel:xeon_e5:2690_v3", "cpe:/o:redhat:enterprise_linux_server_aus:6.6", "cpe:/h:intel:xeon_silver:4109t", "cpe:/h:intel:xeon_e5_1680_v4:-", "cpe:/h:intel:xeon_e5:2667_v4", "cpe:/h:intel:xeon_e7:8860", "cpe:/a:redhat:openstack:13.0", "cpe:/h:intel:xeon_e5_1428l:-", "cpe:/h:intel:xeon_e3:1575m_v5", "cpe:/h:intel:xeon_e5:2658a_v3", "cpe:/h:intel:xeon_e5:2670_v3", "cpe:/h:intel:xeon_gold:85119t", "cpe:/h:intel:atom_z:z3736f", "cpe:/h:intel:xeon_e5_2650_v4:-", "cpe:/h:intel:xeon_e5:2690_v2", "cpe:/h:intel:xeon_silver:4110", "cpe:/h:intel:atom_z:z2520", "cpe:/h:intel:xeon_platinum:8176", "cpe:/h:intel:xeon_e3_1280_v6:-", "cpe:/h:intel:xeon_e3:1565l_v5", "cpe:/a:mitel:micollab:-", "cpe:/h:intel:xeon_e3_1275_v3:-", "cpe:/h:intel:xeon_e3:x3480", "cpe:/h:intel:xeon_e3_1241_v3:-", "cpe:/h:intel:atom_z:z3785", "cpe:/h:intel:xeon_e5_2643_v3:-", "cpe:/h:intel:xeon_e3_1275_v2:-", "cpe:/h:intel:xeon_e3:3600", "cpe:/h:intel:xeon_platinum:8158", "cpe:/h:intel:xeon_e5:2660_v4", "cpe:/a:redhat:openstack:10", "cpe:/h:intel:xeon_e5:4650_v3", "cpe:/h:intel:xeon_e7:8893_v4", "cpe:/h:intel:atom_c:c3950", "cpe:/h:intel:xeon_gold:86150", "cpe:/h:intel:xeon_e3:x5560", "cpe:/h:intel:xeon_e5:4669_v3", "cpe:/h:intel:xeon_e7:4807", "cpe:/h:intel:xeon_e3_1245_v6:-", "cpe:/h:intel:xeon_gold:86138t", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/o:debian:debian_linux:9.0", "cpe:/h:intel:xeon_e5_2609:-", "cpe:/h:intel:xeon_e5:2695_v3", "cpe:/a:sonicwall:cloud_global_management_system:-", "cpe:/o:siemens:ruggedcom_ape_firmware:-"], "id": "CVE-2018-3639", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-3639", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}, "cpe23": ["cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:virtualization:4.2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.7:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:sonicosv:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*", "cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2020-04-06T22:40:24", "bulletinFamily": "software", "cvelist": ["CVE-2018-3639"], "description": "\nF5 Product Development has assigned IDs 721319, 721555, and 721556 (BIG-IP), ID 721949 (BIG-IQ), ID 721945 (Enterprise Manager), and CPF-24903 and CPF-24904 (Traffix) to this vulnerability.\n\nTo determine if your product and version have been evaluated for this vulnerability, refer to the **Applies to (see versions)** box. To determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table. For more information about security advisory versioning, refer to [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>).\n\nProduct | Branch | Versions known to be vulnerable | Fixes introduced in | Severity | CVSSv3 score1 | Vulnerable component or feature \n---|---|---|---|---|---|--- \nBIG-IP (LTM, AAM, AFM, Analytics, APM, ASM, DNS, Edge Gateway, FPS, GTM, Link Controller, PEM, WebAccelerator) | 14.x | 14.0.0 - 14.1.0 | None | Medium | [5.6](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) | F5 hardware platforms* \n13.x | 13.0.0 - 13.1.1 | None \n12.x | 12.1.0 - 12.1.4 | None \n11.x | 11.2.1 - 11.6.3 | None \nARX | 6.x | None | Not applicable | Not vulnerable | None | None \nEnterprise Manager | 3.x | 3.1.1 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nBIG-IQ Centralized Management | 6.x | 6.0.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \n5.x | 5.0.0 - 5.4.0 | None \n4.x | 4.6.0 | None \nBIG-IQ Cloud and Orchestration | 1.x | 1.0.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nF5 iWorkflow | 2.x | 2.1.0 - 2.3.0 | None | Medium | [4.3](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N>) | F5 hardware platforms* \nTraffix SDC | 5.x | 5.0.0 - 5.1.0 | None | Medium | [5.6](<https://first.org/cvss/calculator/3.0#CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) | F5 hardware platforms* \n4.x | 4.4.0 | None \n \n1The CVSSv3 score link takes you to a resource outside of AskF5, and it is possible that the document may be removed without our knowledge.\n\n*For information about the affected hardware platforms, refer to the **Vulnerable platforms** section.\n\nVulnerable platforms\n\nSome platforms may have processors from multiple vendors and may have a vulnerable ARM processor in one or more subsystems. F5 investigated the use of ARM processors and, while vulnerable processors are used, those processors do not handle privileged information; they are limited to running signed firmware from F5 with no capability to execute user-specified code.\n\nThe following tables list only one entry for platform models that have several variants. For example, BIG-IP 11000, BIG-IP 11050, BIG-IP 11050F, and BIG-IP 11050N are all vulnerable and included in the table as \"BIG-IP 110x0.\" \n\nBIG-IP \n\nModel | Processor types | Vulnerable \n---|---|--- \nVIPRION B21x0 | Intel | Y \nVIPRION B2250 | Intel | Y \nVIPRION B4100 | AMD | Y* \nVIPRION B4200 | AMD | Y* \nVIPRION B43x0 | Intel | Y \nVIPRION B44x0 | Intel | Y \nBIG-IP 2xx0 | Intel | Y \nBIG-IP 4xx0 | Intel | Y \nBIG-IP 5xx0 | Intel | Y \nBIG-IP 7xx0 | Intel | Y \nBIG-IP 10xxx | Intel | Y \nBIG-IP 12xx0 | Intel | Y \nBIG-IP i2x00 | Intel, ARM | Y \nBIG-IP i4x00 | Intel, ARM | Y \nBIG-IP i5x00 | Intel, ARM | Y \nBIG-IP i7x00 | Intel, ARM | Y \nBIG-IP i10x00 | Intel, ARM | Y \nBIG-IP 800 | Intel | Y \nBIG-IP 1600 | Intel | Y \nBIG-IP 3600 | Intel | Y \nBIG-IP 3900 | Intel | Y \nBIG-IP 6900 | AMD | Y* \nBIG-IP 89x0 | AMD | Y* \nBIG-IP 110x0 | AMD | Y* \nBIG-IP 6400 | AMD | Y* \n \n*F5 believes these platforms are vulnerable, but AMD has yet to confirm. AMD has not published plans to provide fixes for these CPUs.\n\nBIG-IQ, Enterprise Manager, FirePass, and ARX\n\nModel | Processor type | Vulnerable \n---|---|--- \nBIG-IQ 7000 | Intel | Y \nEnterprise Manager 4000 | Intel | Y \nFirePass 12xx | Intel | N \nFirePass 41xx | AMD | Y* \nFirePass 43xx | AMD | Y* \nARX 1500+ | Intel | Y \nARX 2500 | Intel | Y \nARX 4000/4000+ | Intel | Y \n \n*Intel and AMD have not responded to repeated requests for information about the processors in these platforms. Therefore, based on their general public statements, we must assume that they are vulnerable.\n\nIf you are running a version listed in the **Versions known to be vulnerable** column, you can eliminate this vulnerability by upgrading to a version listed in the **Fixes introduced in** column. If the table lists only an older version than what you are currently running, or does not list a non-vulnerable version, then no upgrade candidate currently exists.\n\nMitigation\n\nNone\n\n * [K51812227: Understanding Security Advisory versioning](<https://support.f5.com/csp/article/K51812227>)\n * [K41942608: Overview of Security Advisory articles](<https://support.f5.com/csp/article/K41942608>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n * [K9502: BIG-IP hotfix and point release matrix](<https://support.f5.com/csp/article/K9502>)\n * [K48955220: Installing an OPSWAT Endpoint Security update on BIG-IP APM systems (11.4.x and later)](<https://support.f5.com/csp/article/K48955220>)\n * [K167: Downloading software and firmware from F5](<https://support.f5.com/csp/article/K167>)\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K21232150: Considerations for upgrading BIG-IQ or F5 iWorkflow systems](<https://support.f5.com/csp/article/K21232150>)\n", "edition": 1, "modified": "2019-07-01T18:29:00", "published": "2018-07-10T21:22:00", "id": "F5:K29146534", "href": "https://support.f5.com/csp/article/K29146534", "title": "SSB Variant 4 vulnerability CVE-2018-3639", "type": "f5", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "citrix": [{"lastseen": "2020-12-24T11:42:50", "bulletinFamily": "software", "cvelist": ["CVE-2018-3639"], "description": "<section class=\"article-content\" data-swapid=\"ArticleContent\">\n<div class=\"content-block\" data-swapid=\"ContentBlock\"><div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"DescriptionofProblem\"> Description of Problem</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<p>CVE-2018-3639 Speculative Store Bypass Disable is an issue that may affect third-party software that runs in guest VMs on Citrix XenServer. This is not an issue caused by Citrix XenServer and Citrix is unaware of any means of exploiting this issue against XenServer itself.<br/> Third-party software can mitigate this issue by restructuring of the code; for Intel CPUs, third-party software may instead choose to mitigate this issue by selectively enabling and disabling a CPU feature known as memory disambiguation. This requires both new host firmware and the new functionality of that firmware to be exposed to guest VMs. To expose this firmware functionality, Citrix is releasing hotfixes for supported versions of Citrix XenServer 7.x.<br/> </p>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"WhatCustomersShouldDo\"> What Customers Should Do</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<p>Customers wishing to expose the new host firmware functionality to their guest VMs should install both the Citrix XenServer hotfixes and updated host firmware or BIOS code. The locations of the Citrix XenServer hotfixes are listed below; Citrix recommends following your hardware supplier\u2019s guidance for firmware updates.</p>\n<p>Citrix XenServer 7.4: CTX235133 \u2013 <a href=\"https://support.citrix.com/article/CTX235133\">https://support.citrix.com/article/CTX235133</a></p>\n<p>Citrix XenServer 7.3: CTX235132 \u2013 <a href=\"https://support.citrix.com/article/CTX235132\">https://support.citrix.com/article/CTX235132</a></p>\n<p>Citrix XenServer 7.1 LTSR CU1: CTX235131 \u2013 <a href=\"https://support.citrix.com/article/CTX235131\">https://support.citrix.com/article/CTX235131</a></p>\n<p>Citrix XenServer 7.0: CTX235130 \u2013 <a href=\"https://support.citrix.com/article/CTX235130\">https://support.citrix.com/article/CTX235130</a><br/> </p>\n<p>Note that, in line with previous issues that were not vulnerabilities in Citrix XenServer, mitigations are not available for versions 6.x of Citrix XenServer.<br/> </p>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"WhatCitrixIsDoing\"> What Citrix Is Doing</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix is notifying customers and channel partners about this potential security issue. This article is also available from the Citrix Knowledge Center at <u> <a href=\"http://support.citrix.com/\">http://support.citrix.com/</a></u>.</p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"ObtainingSupportonThisIssue\"> Obtaining Support on This Issue</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>If you require technical assistance with this issue, please contact Citrix Technical Support. Contact details for Citrix Technical Support are available at <u> <a href=\"https://www.citrix.com/support/open-a-support-case.html\">https://www.citrix.com/support/open-a-support-case.html</a></u>. </p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"ReportingSecurityVulnerabilities\"> Reporting Security Vulnerabilities</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<div>\n<div>\n<p>Citrix welcomes input regarding the security of its products and considers any and all potential vulnerabilities seriously. For guidance on how to report security-related issues to Citrix, please see the following document: CTX081743 \u2013 <a href=\"http://support.citrix.com/article/CTX081743\">Reporting Security Issues to Citrix</a></p>\n</div>\n</div>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n<div>\n<!--googleoff: all-->\n<h2 id=\"Changelog\"> Changelog</h2>\n<!--googleon: all-->\n<div>\n<div>\n<div>\n<table border=\"1\" cellpadding=\"1\" cellspacing=\"0\" width=\"100%\">\n<tbody>\n<tr>\n<td>Date </td>\n<td>Change</td>\n</tr>\n<tr>\n<td>22nd May 2018</td>\n<td>Initial Publication</td>\n</tr>\n</tbody>\n</table>\n</div>\n</div>\n</div>\n<!--googleoff: all-->\n<hr/>\n</div>\n</div></div>\n</section>", "modified": "2019-08-15T04:00:00", "published": "2018-05-22T04:00:00", "id": "CTX235225", "href": "https://support.citrix.com/article/CTX235225", "type": "citrix", "title": "CVE-2018-3639 - Citrix XenServer Security Update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "symantec": [{"lastseen": "2019-10-09T00:30:35", "bulletinFamily": "software", "cvelist": ["CVE-2018-3639"], "description": "### Description\n\nMultiple CPU Hardware are prone to an information-disclosure vulnerability. Attackers can exploit this issue to obtain sensitive information that may aid in further attacks.\n\n### Technologies Affected\n\n * ARM Cortex A15 \n * ARM Cortex A57 \n * ARM Cortex A72 \n * IBM AIX 5.3 \n * IBM AIX 6.1 \n * IBM AIX 7.1 \n * IBM Aix 7.2 \n * IBM Vios 2.2.0 \n * Intel 2nd generation Core processors \n * Intel 3rd generation Core processors \n * Intel 4th generation Core processors \n * Intel 5th generation Core processors \n * Intel 6th generation Core processors \n * Intel 7th generation Core processors \n * Intel 8th generation Core processors \n * Intel Atom Processor A Series \n * Intel Atom Processor C Series \n * Intel Atom Processor E Series \n * Intel Atom Processor T Series \n * Intel Atom Processor X Series \n * Intel Atom Processor Z Series \n * Intel Celeron Processor J Series \n * Intel Celeron Processor N Series \n * Intel Core M processor family \n * Intel Core X-series Processor Family for Intel X299 platforms \n * Intel Core X-series Processor Family for Intel X99 platforms \n * Intel Pentium Processor J Series \n * Intel Pentium Processor N Series \n * Intel Pentium Processor Silver Series \n * Intel Xeon Processor E3 Family \n * Intel Xeon Processor E3 v2 Family \n * Intel Xeon Processor E3 v3 Family \n * Intel Xeon Processor E3 v4 Family \n * Intel Xeon Processor E3 v5 Family \n * Intel Xeon Processor E3 v6 Family \n * Intel Xeon Processor E5 Family \n * Intel Xeon Processor E5 v2 Family \n * Intel Xeon Processor E5 v3 Family \n * Intel Xeon Processor E5 v4 Family \n * Intel Xeon Processor E7 Family \n * Intel Xeon Processor E7 v2 Family \n * Intel Xeon Processor E7 v3 Family \n * Intel Xeon Processor E7 v4 Family \n * Intel Xeon processor 3400 series \n * Intel Xeon processor 3600 series \n * Intel Xeon processor 5500 series \n * Intel Xeon processor 5600 series \n * Intel Xeon processor 6500 series \n * Intel Xeon processor 7500 series \n * Microsoft Surface Book 2 \n * Microsoft Surface Laptop \n * Microsoft Surface Pro 3 \n * Microsoft Surface Pro 4 \n * Microsoft Surface Pro Model 1796 \n * Microsoft Surface Pro with Advanced LTE Model 1807 \n * Microsoft Windows 10 Version 1607 for 32-bit Systems \n * Microsoft Windows 10 Version 1607 for x64-based Systems \n * Microsoft Windows 10 Version 1803 for 32-bit Systems \n * Microsoft Windows 10 Version 1803 for x64-based Systems \n * Microsoft Windows 10 for 32-bit Systems \n * Microsoft Windows 10 for x64-based Systems \n * Microsoft Windows 10 version 1703 for 32-bit Systems \n * Microsoft Windows 10 version 1703 for x64-based Systems \n * Microsoft Windows 10 version 1709 for 32-bit Systems \n * Microsoft Windows 10 version 1709 for x64-based Systems \n * Microsoft Windows 7 for 32-bit Systems SP1 \n * Microsoft Windows 7 for x64-based Systems SP1 \n * Microsoft Windows 8.1 for 32-bit Systems \n * Microsoft Windows 8.1 for 64-bit Systems \n * Microsoft Windows RT 8.1 \n * Microsoft Windows Server 1709 \n * Microsoft Windows Server 1803 \n * Microsoft Windows Server 2008 R2 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 R2 for x64-based Systems (Server Core instal SP1 \n * Microsoft Windows Server 2008 R2 for x64-based Systems SP1 \n * Microsoft Windows Server 2008 for 32-bit Systems (Server Core installation SP2 \n * Microsoft Windows Server 2008 for 32-bit Systems SP2 \n * Microsoft Windows Server 2008 for x64-based Systems (Server Core installat SP2 \n * Microsoft Windows Server 2008 for x64-based Systems SP2 \n * Microsoft Windows Server 2012 \n * Microsoft Windows Server 2012 R2 \n * Microsoft Windows Server 2016 \n * NetApp SolidFire Element OS Management Node \n * Oracle Solaris 11 \n * Redhat Enterprise Linux Desktop 6 \n * Redhat Enterprise Linux Desktop 7 \n * Redhat Enterprise Linux EUS Compute Node 6.7 \n * Redhat Enterprise Linux EUS Compute Node 7.3 \n * Redhat Enterprise Linux EUS Compute Node 7.4 \n * Redhat Enterprise Linux EUS Compute Node 7.5 \n * Redhat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.3 \n * Redhat Enterprise Linux Server (for IBM Power LE) - Update Services for SAP Solutions 7.4 \n * Redhat Enterprise Linux Server - AUS 6.6 \n * Redhat Enterprise Linux Server - AUS 7.2 \n * Redhat Enterprise Linux Server - AUS 7.3 \n * Redhat Enterprise Linux Server - AUS 7.4 \n * Redhat Enterprise Linux Server - Extended Update Support 6.7 \n * Redhat Enterprise Linux Server - Extended Update Support 7.3 \n * Redhat Enterprise Linux Server - Extended Update Support 7.4 \n * Redhat Enterprise Linux Server - Extended Update Support 7.5 \n * Redhat Enterprise Linux Server - TUS 6.6 \n * Redhat Enterprise Linux Server - TUS 7.2 \n * Redhat Enterprise Linux Server - TUS 7.3 \n * Redhat Enterprise Linux Server - TUS 7.4 \n * Redhat Enterprise Linux Server - Update Services for SAP Solutions 7.2 \n * Redhat Enterprise Linux Server - Update Services for SAP Solutions 7.3 \n * Redhat Enterprise Linux Server - Update Services for SAP Solutions 7.4 \n * Redhat Enterprise Linux Server 6 \n * Redhat Enterprise Linux Server 7 \n * Redhat Enterprise Linux Server AUS 6.4 \n * Redhat Enterprise Linux Server AUS 6.5 \n * Redhat Enterprise Linux Workstation 6 \n * Redhat Enterprise Linux Workstation 7 \n * Redhat Enterprise Linux for ARM 64 7 \n * Redhat Enterprise Linux for IBM System z (Structure A) 7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 6.7 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 7.3 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 7.4 \n * Redhat Enterprise Linux for IBM z Systems - Extended Update Support 7.5 \n * Redhat Enterprise Linux for IBM z Systems 7 \n * Redhat Enterprise Linux for Power 9 7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 6.7 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.3 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.4 \n * Redhat Enterprise Linux for Power, big endian - Extended Update Support 7.5 \n * Redhat Enterprise Linux for Power, big endian 6 \n * Redhat Enterprise Linux for Power, big endian 7 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.3 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.4 \n * Redhat Enterprise Linux for Power, little endian - Extended Update Supp 7.5 \n * Redhat Enterprise Linux for Power, little endian 7 \n * Redhat Enterprise Linux for Real Time 7 \n * Redhat Enterprise Linux for Real Time for NFV 7 \n * Redhat Enterprise Linux for Scientific Computing 6 \n * Redhat Enterprise Linux for Scientific Computing 7 \n * Redhat Gluster Storage Server for On-premise 3 for RHEL 7 \n * Redhat MRG Realtime 2 \n * Redhat OpenStack 10.0 \n * Redhat OpenStack 12.0 \n * Redhat OpenStack 7.0 \n * Redhat OpenStack 8.0 \n * Redhat OpenStack 9.0 \n * Redhat OpenStack for IBM Power 12.0 \n * Redhat Virtualization - ELS 3 \n * Redhat Virtualization 4 \n * Redhat Virtualization Host 4 \n * Redhat Virtualization Manager 4.2 \n * Redhat Virtualization for IBM Power LE 4 \n * Synology Dsm 5.2 \n * Synology Dsm 6.0 \n * Synology Dsm 6.1 \n * Synology Sky NAS \n * Synology Virtual DSM \n * Ubuntu Ubuntu Linux 14.04 LTS \n * Ubuntu Ubuntu Linux 16.04 LTS \n * Ubuntu Ubuntu Linux 17.10 \n * Ubuntu Ubuntu Linux 18.04 LTS \n * VMWare Fusion 10.0 \n * VMWare Fusion 10.1.1 \n * VMWare Fusion Pro 10.0 \n * VMWare Fusion Pro 10.1.1 \n * VMWare Workstation Player 14.0 \n * VMWare Workstation Player 14.1 \n * VMWare Workstation Player 14.1.1 \n * VMWare Workstation Pro 14.0 \n * VMWare Workstation Pro 14.1 \n * VMWare Workstation Pro 14.1.1 \n * VMWare vCenter Server 5.5 \n * VMWare vCenter Server 6.0 \n * VMWare vCenter Server 6.5 \n * VMWare vCenter Server 6.7 \n * VMWare vSphere ESXi 5.5 \n * VMWare vSphere ESXi 6.0 \n * VMWare vSphere ESXi 6.5 \n * VMWare vSphere ESXi 6.7 \n * Xen Xen \n\n### Recommendations\n\n**Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.** \nGiven the local nature of this issue, grant only trusted and accountable individuals access to affected computers. \n\nUpdates are available. Please see the references or vendor advisory for more information.\n", "modified": "2018-05-21T00:00:00", "published": "2018-05-21T00:00:00", "id": "SMNTC-104232", "href": "https://www.symantec.com/content/symantec/english/en/security-center/vulnerabilities/writeup.html/104232", "type": "symantec", "title": "Multiple CPU Hardware CVE-2018-3639 Information Disclosure Vulnerability", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "virtuozzo": [{"lastseen": "2019-11-05T11:28:22", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab130.1 for Virtuozzo 6.0 that is a rebase to the Red Hat Enterprise Linux 6.9 kernel 2.6.32-696.30.1.el6. The new kernel introduces security and stability fixes.\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-23T00:00:00", "published": "2018-05-23T00:00:00", "id": "VZA-2018-033", "href": "https://help.virtuozzo.com/customer/portal/articles/2940774", "title": "Important kernel security update: CVE-2018-3639; new kernel 2.6.32-042stab130.1; Virtuozzo 6.0 Update 12 Hotfix 25 (6.0.12-3705)", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:58", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab130.1 for Virtuozzo Containers for Linux 4.7 and Server Bare Metal 5.0 that is a rebase to the Red Hat Enterprise Linux 6.9 kernel 2.6.32-696.30.1.el6. The new kernel introduces security and stability fixes.\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-23T00:00:00", "published": "2018-05-23T00:00:00", "id": "VZA-2018-032", "href": "https://help.virtuozzo.com/customer/portal/articles/2940773", "title": "Important kernel security update: CVE-2018-3639; new kernel 2.6.32-042stab130.1 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1087", "CVE-2018-3639"], "description": "This hotfix provides security fixes for the hypervisor part of Virtuozzo 6.0 Update 12.\n**Vulnerability id:** CVE-2018-1087\nA flaw was found in the way the Linux kernel's KVM hypervisor handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, the processor did not deliver interrupts and exceptions, rather they are delivered once the first instruction after the stack switch is executed. An unprivileged KVM guest user could use this flaw to crash the guest or, potentially, escalate their privileges in the guest.\n\n**Vulnerability id:** CVE-2018-3639\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n", "edition": 1, "modified": "2018-05-28T00:00:00", "published": "2018-05-28T00:00:00", "id": "VZA-2018-034", "href": "https://help.virtuozzo.com/customer/portal/articles/2941425", "title": "Important product update: Fixes for CVE-2018-3639 and CVE-2018-1087 in virtual machines; Virtuozzo 6.0 Update 12 Hotfix 26 (6.0.12-3707)", "type": "virtuozzo", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-11-05T11:27:51", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1120", "CVE-2018-10872", "CVE-2018-3665", "CVE-2018-8897", "CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab132.1 for Virtuozzo 6.0 that is a rebase to the Red Hat Enterprise Linux 6.10 kernel 2.6.32-754.2.1.el6. The new kernel introduces security fixes.\n**Vulnerability id:** CVE-2018-3639\n[x86 AMD] An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n**Vulnerability id:** CVE-2018-1120\nBy mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).\n\n**Vulnerability id:** CVE-2018-3665\nA Floating Point Unit (FPU) state information leakage flaw was found in the way the Linux kernel saved and restored the FPU state during task switch. Linux kernels that follow the 'Lazy FPU Restore' scheme are vulnerable to the FPU state information leakage issue. An unprivileged local attacker could use this flaw to read FPU state bits by conducting targeted cache side-channel attacks, similar to the Meltdown vulnerability disclosed earlier this year.\n\n**Vulnerability id:** CVE-2018-10872\nA flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897.\n\n", "edition": 1, "modified": "2018-07-16T00:00:00", "published": "2018-07-16T00:00:00", "id": "VZA-2018-048", "href": "https://help.virtuozzo.com/customer/portal/articles/2948376", "title": "Important kernel security update: CVE-2018-3639 (x86 AMD) and other issues; new kernel 2.6.32-042stab132.1; Virtuozzo 6.0 Update 12 Hotfix 29 (6.0.12-3710)", "type": "virtuozzo", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-11-05T11:28:17", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1120", "CVE-2018-10872", "CVE-2018-3665", "CVE-2018-8897", "CVE-2018-3639"], "description": "This update provides a new kernel 2.6.32-042stab132.1 for Virtuozzo Containers for Linux 4.7 and Server Bare Metal 5.0 that is a rebase to the Red Hat Enterprise Linux 6.10 kernel 2.6.32-754.2.1.el6. The new kernel introduces security fixes.\n**Vulnerability id:** CVE-2018-3639\n[x86 AMD] An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.\n\n**Vulnerability id:** CVE-2018-1120\nBy mmap()ing a FUSE-backed file onto a process's memory containing command line arguments (or environment strings), an attacker can cause utilities from psutils or procps (such as ps, w) or any other program which makes a read() call to the /proc/<pid>/cmdline (or /proc/<pid>/environ) files to block indefinitely (denial of service) or for some controlled time (as a synchronization primitive for other attacks).\n\n**Vulnerability id:** CVE-2018-3665\nA Floating Point Unit (FPU) state information leakage flaw was found in the way the Linux kernel saved and restored the FPU state during task switch. Linux kernels that follow the 'Lazy FPU Restore' scheme are vulnerable to the FPU state information leakage issue. An unprivileged local attacker could use this flaw to read FPU state bits by conducting targeted cache side-channel attacks, similar to the Meltdown vulnerability disclosed earlier this year.\n\n**Vulnerability id:** CVE-2018-10872\nA flaw was found in the way the Linux kernel handled exceptions delivered after a stack switch operation via Mov SS or Pop SS instructions. During the stack switch operation, processor does not deliver interrupts and exceptions, they are delivered once the first instruction after the stack switch is executed. An unprivileged system user could use this flaw to crash the system kernel resulting in DoS. This CVE-2018-10872 was assigned due to regression of CVE-2018-8897.\n\n", "edition": 1, "modified": "2018-07-16T00:00:00", "published": "2018-07-16T00:00:00", "id": "VZA-2018-047", "href": "https://help.virtuozzo.com/customer/portal/articles/2948375", "title": "Important kernel security update: CVE-2018-3639 (x86 AMD) and other issues; new kernel 2.6.32-042stab132.1 for Virtuozzo Containers for Linux 4.7, Server Bare Metal 5.0", "type": "virtuozzo", "cvss": {"score": 7.2, "vector": "AV:L/AC:L/Au:N/C:C/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T01:15:26", "description": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639", "edition": 27, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "AIX 7.2 TL 0 : variant4 (IJ05821) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:ibm:aix:7.2"], "id": "AIX_IJ05821.NASL", "href": "https://www.tenable.com/plugins/nessus/109953", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory variant4_advisory.asc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109953);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/04/05 23:25:05\");\n\n script_cve_id(\"CVE-2018-3639\");\n\n script_name(english:\"AIX 7.2 TL 0 : variant4 (IJ05821) (Spectre)\");\n script_summary(english:\"Check for APAR IJ05821\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.2\", ml:\"00\", sp:\"04\", patch:\"IJ05821m4a\", package:\"bos.mp64\", minfilesetver:\"7.2.0.0\", maxfilesetver:\"7.2.0.6\") < 0) flag++;\nif (aix_check_ifix(release:\"7.2\", ml:\"00\", sp:\"05\", patch:\"IJ05821m5a\", package:\"bos.mp64\", minfilesetver:\"7.2.0.0\", maxfilesetver:\"7.2.0.6\") < 0) flag++;\nif (aix_check_ifix(release:\"7.2\", ml:\"00\", sp:\"06\", patch:\"IJ05821m6a\", package:\"bos.mp64\", minfilesetver:\"7.2.0.0\", maxfilesetver:\"7.2.0.6\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T05:12:09", "description": "An update for kernel is now available for Red Hat Enterprise Linux 6.4\nAdvanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software side of\nthe mitigation for this hardware issue. To be fully functional,\nup-to-date CPU microcode applied on the system is required. Please\nrefer to References section for further information about this issue,\nCPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "edition": 32, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-30T00:00:00", "title": "RHEL 6 : kernel (RHSA-2018:1641) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel", "p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64", "p-cpe:/a:redhat:enterprise_linux:kernel-firmware", "p-cpe:/a:redhat:enterprise_linux:kernel-devel", "cpe:/o:redhat:enterprise_linux:6.4", "p-cpe:/a:redhat:enterprise_linux:kernel-debug", "p-cpe:/a:redhat:enterprise_linux:kernel-headers", "p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo", "p-cpe:/a:redhat:enterprise_linux:perf-debuginfo", "p-cpe:/a:redhat:enterprise_linux:kernel", "p-cpe:/a:redhat:enterprise_linux:python-perf", "p-cpe:/a:redhat:enterprise_linux:perf", "p-cpe:/a:redhat:enterprise_linux:kernel-doc"], "id": "REDHAT-RHSA-2018-1641.NASL", "href": "https://www.tenable.com/plugins/nessus/110219", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:1641. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110219);\n script_version(\"1.16\");\n script_cvs_date(\"Date: 2019/10/24 15:35:45\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:1641\");\n script_xref(name:\"IAVA\", value:\"2018-A-0170\");\n\n script_name(english:\"RHEL 6 : kernel (RHSA-2018:1641) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for kernel is now available for Red Hat Enterprise Linux 6.4\nAdvanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software side of\nthe mitigation for this hardware issue. To be fully functional,\nup-to-date CPU microcode applied on the system is required. Please\nrefer to References section for further information about this issue,\nCPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ssbd\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:1641\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-3639\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-debuginfo-common-x86_64\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:python-perf-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/30\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\", \"linux_alt_patch_detect.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\ninclude(\"ksplice.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6\\.4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.4\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nif (get_one_kb_item(\"Host/ksplice/kernel-cves\"))\n{\n rm_kb_item(name:\"Host/uptrack-uname-r\");\n cve_list = make_list(\"CVE-2018-3639\");\n if (ksplice_cves_check(cve_list))\n {\n audit(AUDIT_PATCH_INSTALLED, \"KSplice hotfix for RHSA-2018:1641\");\n }\n else\n {\n __rpm_report = ksplice_reporting_text();\n }\n}\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:1641\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-debug-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-debug-debuginfo-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-debug-devel-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-debuginfo-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-debuginfo-common-x86_64-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-devel-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", reference:\"kernel-doc-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", reference:\"kernel-firmware-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"kernel-headers-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"perf-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"perf-debuginfo-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"python-perf-2.6.32-358.88.4.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"python-perf-debuginfo-2.6.32-358.88.4.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"kernel / kernel-debug / kernel-debug-debuginfo / kernel-debug-devel / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T01:15:26", "description": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639", "edition": 27, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "AIX 7.2 TL 2 : variant4 (IJ05818) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:ibm:aix:7.2"], "id": "AIX_IJ05818.NASL", "href": "https://www.tenable.com/plugins/nessus/109951", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory variant4_advisory.asc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109951);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/04/05 23:25:05\");\n\n script_cve_id(\"CVE-2018-3639\");\n\n script_name(english:\"AIX 7.2 TL 2 : variant4 (IJ05818) (Spectre)\");\n script_summary(english:\"Check for APAR IJ05818\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:7.2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"7.2\", ml:\"02\", sp:\"00\", patch:\"IJ05818m1a\", package:\"bos.mp64\", minfilesetver:\"7.2.2.0\", maxfilesetver:\"7.2.2.16\") < 0) flag++;\nif (aix_check_ifix(release:\"7.2\", ml:\"02\", sp:\"01\", patch:\"IJ05818m1a\", package:\"bos.mp64\", minfilesetver:\"7.2.2.0\", maxfilesetver:\"7.2.2.16\") < 0) flag++;\nif (aix_check_ifix(release:\"7.2\", ml:\"02\", sp:\"02\", patch:\"IJ05818s2a\", package:\"bos.mp64\", minfilesetver:\"7.2.2.0\", maxfilesetver:\"7.2.2.16\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T05:15:13", "description": "An update for libvirt is now available for Red Hat Enterprise Linux\n6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe libvirt library contains a C API for managing and interacting with\nthe virtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "edition": 21, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-10-31T00:00:00", "title": "RHEL 6 : libvirt (RHSA-2018:3399) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:libvirt-client", "p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock", "p-cpe:/a:redhat:enterprise_linux:libvirt", "p-cpe:/a:redhat:enterprise_linux:libvirt-python", "cpe:/o:redhat:enterprise_linux:6.4", "p-cpe:/a:redhat:enterprise_linux:libvirt-debuginfo", "p-cpe:/a:redhat:enterprise_linux:libvirt-devel"], "id": "REDHAT-RHSA-2018-3399.NASL", "href": "https://www.tenable.com/plugins/nessus/118548", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:3399. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(118548);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2019/10/24 15:35:45\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:3399\");\n\n script_name(english:\"RHEL 6 : libvirt (RHSA-2018:3399) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for libvirt is now available for Red Hat Enterprise Linux\n6.4 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe libvirt library contains a C API for managing and interacting with\nthe virtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639 virt-ssbd AMD)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ssbd\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:3399\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-3639\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt-lock-sanlock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:libvirt-python\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/10/30\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/10/31\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6\\.4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.4\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:3399\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"libvirt-client-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-client-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"libvirt-debuginfo-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-debuginfo-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"i686\", reference:\"libvirt-devel-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-devel-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-lock-sanlock-0.10.2-18.el6_4.18\")) flag++;\n if (rpm_check(release:\"RHEL6\", sp:\"4\", cpu:\"x86_64\", reference:\"libvirt-python-0.10.2-18.el6_4.18\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt / libvirt-client / libvirt-debuginfo / libvirt-devel / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-09-14T18:25:38", "description": "Security Fix(es) :\n\n - An industry-wide issue was found in the way many modern\n microprocessor designs have implemented speculative\n execution of Load & Store instructions (a commonly\n used performance optimization). It relies on the\n presence of a precisely-defined instruction sequence in\n the privileged code as well as the fact that memory read\n from address to which a recent memory write has occurred\n may see an older value and subsequently cause an update\n into the microprocessor's data cache even for\n speculatively executed instructions that never actually\n commit (retire). As a result, an unprivileged attacker\n could use this flaw to read privileged memory by\n conducting targeted cache side-channel attacks.\n (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.", "edition": 16, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-06-27T00:00:00", "title": "Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180626) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2018-06-27T00:00:00", "cpe": ["p-cpe:/a:fermilab:scientific_linux:qemu-img", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-common", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm", "x-cpe:/o:fermilab:scientific_linux", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-tools", "p-cpe:/a:fermilab:scientific_linux:qemu-kvm-debuginfo"], "id": "SL_20180626_QEMU_KVM_ON_SL7_X.NASL", "href": "https://www.tenable.com/plugins/nessus/110720", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text is (C) Scientific Linux.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110720);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/02/24\");\n\n script_cve_id(\"CVE-2018-3639\");\n\n script_name(english:\"Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20180626) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Scientific Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Security Fix(es) :\n\n - An industry-wide issue was found in the way many modern\n microprocessor designs have implemented speculative\n execution of Load & Store instructions (a commonly\n used performance optimization). It relies on the\n presence of a precisely-defined instruction sequence in\n the privileged code as well as the fact that memory read\n from address to which a recent memory write has occurred\n may see an older value and subsequently cause an update\n into the microprocessor's data cache even for\n speculatively executed instructions that never actually\n commit (retire). As a result, an unprivileged attacker\n could use this flaw to read privileged memory by\n conducting targeted cache side-channel attacks.\n (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\"\n );\n # https://listserv.fnal.gov/scripts/wa.exe?A2=ind1806&L=scientific-linux-errata&F=&S=&P=5623\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9e625e81\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fermilab:scientific_linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"x-cpe:/o:fermilab:scientific_linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/06/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/06/27\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Scientific Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Scientific Linux \" >!< release) audit(AUDIT_HOST_NOT, \"running Scientific Linux\");\nos_ver = pregmatch(pattern: \"Scientific Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Scientific Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Scientific Linux 7.x\", \"Scientific Linux \" + os_ver);\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu >!< \"x86_64\" && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Scientific Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-156.el7_5.3\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-156.el7_5.3\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-156.el7_5.3\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-debuginfo-1.5.3-156.el7_5.3\")) flag++;\nif (rpm_check(release:\"SL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-156.el7_5.3\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu-img / qemu-kvm / qemu-kvm-common / qemu-kvm-debuginfo / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T01:15:30", "description": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639", "edition": 26, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "AIX 5.3 TL 12 : variant4 (IJ05826) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:ibm:aix:5.3"], "id": "AIX_IJ05826.NASL", "href": "https://www.tenable.com/plugins/nessus/109957", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The text in the description was extracted from AIX Security\n# Advisory variant4_advisory.asc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109957);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/04/05 23:25:05\");\n\n script_cve_id(\"CVE-2018-3639\");\n\n script_name(english:\"AIX 5.3 TL 12 : variant4 (IJ05826) (Spectre)\");\n script_summary(english:\"Check for APAR IJ05826\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote AIX host is missing a security patch.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://aix.software.ibm.com/aix/efixes/security/variant4_advisory.asc\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Install the appropriate interim fix.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:ibm:aix:5.3\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"AIX Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/AIX/lslpp\", \"Host/local_checks_enabled\", \"Host/AIX/version\");\n\n exit(0);\n}\n\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"aix.inc\");\ninclude(\"misc_func.inc\");\n\nif ( ! get_kb_item(\"Host/local_checks_enabled\") ) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif ( ! get_kb_item(\"Host/AIX/version\") ) audit(AUDIT_OS_NOT, \"AIX\");\nif ( ! get_kb_item(\"Host/AIX/lslpp\") ) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif ( get_kb_item(\"Host/AIX/emgr_failure\" ) ) exit(0, \"This iFix check is disabled because : \"+get_kb_item(\"Host/AIX/emgr_failure\") );\n\nflag = 0;\n\nif (aix_check_ifix(release:\"5.3\", ml:\"12\", sp:\"09\", patch:\"IJ05826m9b\", package:\"bos.mp64\", minfilesetver:\"5.3.12.0\", maxfilesetver:\"5.3.12.10\") < 0) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:aix_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T01:10:32", "description": "New kernel packages are available for Slackware 14.2 to fix security\nissues.", "edition": 22, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-07-30T00:00:00", "title": "Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-208-01) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:slackware:slackware_linux:14.2", "p-cpe:/a:slackware:slackware_linux:kernel-generic-smp", "p-cpe:/a:slackware:slackware_linux:kernel-headers", "p-cpe:/a:slackware:slackware_linux:kernel-firmware", "p-cpe:/a:slackware:slackware_linux:kernel-generic", "p-cpe:/a:slackware:slackware_linux:kernel-modules-smp", "p-cpe:/a:slackware:slackware_linux:kernel-source", "p-cpe:/a:slackware:slackware_linux:kernel-huge-smp", "p-cpe:/a:slackware:slackware_linux:kernel-modules", "p-cpe:/a:slackware:slackware_linux:kernel-huge"], "id": "SLACKWARE_SSA_2018-208-01.NASL", "href": "https://www.tenable.com/plugins/nessus/111413", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Slackware Security Advisory 2018-208-01. The text \n# itself is copyright (C) Slackware Linux, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(111413);\n script_version(\"1.3\");\n script_cvs_date(\"Date: 2019/04/05 23:25:07\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"SSA\", value:\"2018-208-01\");\n\n script_name(english:\"Slackware 14.2 : Slackware 14.2 kernel (SSA:2018-208-01) (Spectre)\");\n script_summary(english:\"Checks for updated packages in /var/log/packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Slackware host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"New kernel packages are available for Slackware 14.2 to fix security\nissues.\"\n );\n # http://www.slackware.com/security/viewer.php?l=slackware-security&y=2018&m=slackware-security.721251\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?1a325f6e\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-firmware\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-generic\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-generic-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-headers\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-huge\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-huge-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-modules\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-modules-smp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:slackware:slackware_linux:kernel-source\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:slackware:slackware_linux:14.2\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/07/27\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/07/30\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Slackware Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Slackware/release\", \"Host/Slackware/packages\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"slackware.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Slackware/release\")) audit(AUDIT_OS_NOT, \"Slackware\");\nif (!get_kb_item(\"Host/Slackware/packages\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Slackware\", cpu);\n\n\nflag = 0;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-firmware\", pkgver:\"20180727_b01151b\", pkgarch:\"noarch\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-generic\", pkgver:\"4.4.144\", pkgarch:\"i586\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-generic-smp\", pkgver:\"4.4.144_smp\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-headers\", pkgver:\"4.4.144_smp\", pkgarch:\"x86\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-huge\", pkgver:\"4.4.144\", pkgarch:\"i586\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-huge-smp\", pkgver:\"4.4.144_smp\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-modules\", pkgver:\"4.4.144\", pkgarch:\"i586\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-modules-smp\", pkgver:\"4.4.144_smp\", pkgarch:\"i686\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", pkgname:\"kernel-source\", pkgver:\"4.4.144_smp\", pkgarch:\"noarch\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-firmware\", pkgver:\"20180727_b01151b\", pkgarch:\"noarch\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-generic\", pkgver:\"4.4.144\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-headers\", pkgver:\"4.4.144\", pkgarch:\"x86\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-huge\", pkgver:\"4.4.144\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-modules\", pkgver:\"4.4.144\", pkgarch:\"x86_64\", pkgnum:\"1\")) flag++;\nif (slackware_check(osver:\"14.2\", arch:\"x86_64\", pkgname:\"kernel-source\", pkgver:\"4.4.144\", pkgarch:\"noarch\", pkgnum:\"1\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:slackware_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T05:12:17", "description": "An update for qemu-kvm is now available for Red Hat Enterprise Linux\n7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "edition": 35, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "RHEL 7 : qemu-kvm (RHSA-2018:1663) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools", "cpe:/o:redhat:enterprise_linux:7.4", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo", "p-cpe:/a:redhat:enterprise_linux:qemu-img", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm"], "id": "REDHAT-RHSA-2018-1663.NASL", "href": "https://www.tenable.com/plugins/nessus/110012", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:1663. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(110012);\n script_version(\"1.17\");\n script_cvs_date(\"Date: 2019/10/24 15:35:45\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:1663\");\n script_xref(name:\"IAVA\", value:\"2018-A-0170\");\n\n script_name(english:\"RHEL 7 : qemu-kvm (RHSA-2018:1663) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for qemu-kvm is now available for Red Hat Enterprise Linux\n7.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ssbd\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:1663\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-3639\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.4\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7\\.4([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.4\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:1663\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", sp:\"4\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-141.el7_4.7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"4\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-141.el7_4.7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"4\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-141.el7_4.7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"4\", cpu:\"x86_64\", reference:\"qemu-kvm-debuginfo-1.5.3-141.el7_4.7\")) flag++;\n if (rpm_check(release:\"RHEL7\", sp:\"4\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-141.el7_4.7\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu-img / qemu-kvm / qemu-kvm-common / qemu-kvm-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T05:12:06", "description": "An update for qemu-kvm is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "edition": 36, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "RHEL 7 : qemu-kvm (RHSA-2018:1633) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools", "cpe:/o:redhat:enterprise_linux:7.7", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo", "cpe:/o:redhat:enterprise_linux:7.5", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:qemu-img", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:qemu-kvm"], "id": "REDHAT-RHSA-2018-1633.NASL", "href": "https://www.tenable.com/plugins/nessus/109995", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2018:1633. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109995);\n script_version(\"1.19\");\n script_cvs_date(\"Date: 2019/10/24 15:35:44\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:1633\");\n script_xref(name:\"IAVA\", value:\"2018-A-0170\");\n\n script_name(english:\"RHEL 7 : qemu-kvm (RHSA-2018:1633) (Spectre)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for qemu-kvm is now available for Red Hat Enterprise Linux\n7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution\nfor Linux on a variety of architectures. The qemu-kvm packages provide\nthe user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/vulnerabilities/ssbd\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2018:1633\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2018-3639\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-img\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-common\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.5\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/21\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_set_attribute(attribute:\"stig_severity\", value:\"II\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2018:1633\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-img-1.5.3-156.el7_5.2\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-1.5.3-156.el7_5.2\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-common-1.5.3-156.el7_5.2\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-debuginfo-1.5.3-156.el7_5.2\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"qemu-kvm-tools-1.5.3-156.el7_5.2\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"qemu-img / qemu-kvm / qemu-kvm-common / qemu-kvm-debuginfo / etc\");\n }\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2021-01-01T04:43:32", "description": "From Red Hat Security Advisory 2018:1632 :\n\nAn update for libvirt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe libvirt library contains a C API for managing and interacting with\nthe virtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.", "edition": 28, "cvss3": {"score": 5.5, "vector": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}, "published": "2018-05-23T00:00:00", "title": "Oracle Linux 7 : libvirt (ELSA-2018-1632) (Spectre)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:libvirt-daemon-driver-lxc", "p-cpe:/a:oracle:linux:libvirt-login-shell", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-logical", "p-cpe:/a:oracle:linux:libvirt-daemon-config-nwfilter", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-mpath", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-qemu", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-nwfilter", "p-cpe:/a:oracle:linux:libvirt-admin", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-interface", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-secret", "p-cpe:/a:oracle:linux:libvirt-devel", "p-cpe:/a:oracle:linux:libvirt-daemon", "p-cpe:/a:oracle:linux:libvirt-client", "p-cpe:/a:oracle:linux:libvirt-lock-sanlock", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-gluster", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-disk", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-core", "p-cpe:/a:oracle:linux:libvirt-daemon-config-network", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-rbd", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-iscsi", "p-cpe:/a:oracle:linux:libvirt-nss", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-nodedev", "p-cpe:/a:oracle:linux:libvirt-libs", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-network", "p-cpe:/a:oracle:linux:libvirt-docs", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-scsi", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:libvirt-daemon-kvm", "p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage", "p-cpe:/a:oracle:linux:libvirt", "p-cpe:/a:oracle:linux:libvirt-daemon-lxc"], "id": "ORACLELINUX_ELSA-2018-1632.NASL", "href": "https://www.tenable.com/plugins/nessus/109978", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2018:1632 and \n# Oracle Linux Security Advisory ELSA-2018-1632 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(109978);\n script_version(\"1.8\");\n script_cvs_date(\"Date: 2019/09/27 13:00:38\");\n\n script_cve_id(\"CVE-2018-3639\");\n script_xref(name:\"RHSA\", value:\"2018:1632\");\n\n script_name(english:\"Oracle Linux 7 : libvirt (ELSA-2018-1632) (Spectre)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2018:1632 :\n\nAn update for libvirt is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nThe libvirt library contains a C API for managing and interacting with\nthe virtualization capabilities of Linux and other operating systems.\nIn addition, libvirt provides tools for remote management of\nvirtualized systems.\n\nSecurity Fix(es) :\n\n* An industry-wide issue was found in the way many modern\nmicroprocessor designs have implemented speculative execution of Load\n& Store instructions (a commonly used performance optimization). It\nrelies on the presence of a precisely-defined instruction sequence in\nthe privileged code as well as the fact that memory read from address\nto which a recent memory write has occurred may see an older value and\nsubsequently cause an update into the microprocessor's data cache even\nfor speculatively executed instructions that never actually commit\n(retire). As a result, an unprivileged attacker could use this flaw to\nread privileged memory by conducting targeted cache side-channel\nattacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2018-May/007751.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected libvirt packages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:POC/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:P/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-admin\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-client\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-config-network\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-config-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-interface\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-network\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-nodedev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-nwfilter\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-qemu\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-secret\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-core\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-disk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-gluster\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-iscsi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-logical\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-mpath\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-rbd\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-driver-storage-scsi\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-kvm\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-daemon-lxc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-docs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-lock-sanlock\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-login-shell\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:libvirt-nss\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2018/05/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2018/05/23\");\n script_set_attribute(attribute:\"in_the_news\", value:\"true\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2018-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-admin-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-client-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-config-network-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-config-nwfilter-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-interface-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-lxc-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-network-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-nodedev-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-nwfilter-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-qemu-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-secret-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-core-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-disk-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-gluster-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-iscsi-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-logical-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-mpath-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-rbd-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-driver-storage-scsi-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-kvm-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-daemon-lxc-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-devel-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-docs-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-libs-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-lock-sanlock-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-login-shell-3.9.0-14.el7_5.5\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"libvirt-nss-3.9.0-14.el7_5.5\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"libvirt / libvirt-admin / libvirt-client / libvirt-daemon / etc\");\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "redhat": [{"lastseen": "2019-08-13T18:45:50", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T03:07:05", "published": "2018-05-22T02:58:28", "id": "RHSA-2018:1662", "href": "https://access.redhat.com/errata/RHSA-2018:1662", "type": "redhat", "title": "(RHSA-2018:1662) Important: qemu-kvm security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:47:01", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-06-26T19:39:00", "published": "2018-06-26T18:59:53", "id": "RHSA-2018:2001", "href": "https://access.redhat.com/errata/RHSA-2018:2001", "type": "redhat", "title": "(RHSA-2018:2001) Important: qemu-kvm security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:32", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T01:47:04", "published": "2018-05-22T01:13:25", "id": "RHSA-2018:1629", "href": "https://access.redhat.com/errata/RHSA-2018:1629", "type": "redhat", "title": "(RHSA-2018:1629) Important: kernel security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:44:53", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T03:05:46", "published": "2018-05-22T02:58:30", "id": "RHSA-2018:1659", "href": "https://access.redhat.com/errata/RHSA-2018:1659", "type": "redhat", "title": "(RHSA-2018:1659) Important: qemu-kvm security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:52", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The rhvm-setup-plugins package adds functionality exclusive only to Red Hat Virtualization Manager, and is not available for the upstream ovirt-engine. It includes the configuration of the Red Hat Support plugin, copying downstream-only artifacts to the ISO domain, and links to the knowledgebase and other support material.\n\nThe following packages have been upgraded to a later upstream version: rhvm-setup-plugins (4.2.9). (BZ#1579326)\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T04:32:23", "published": "2018-05-22T03:04:04", "id": "RHSA-2018:1674", "href": "https://access.redhat.com/errata/RHSA-2018:1674", "type": "redhat", "title": "(RHSA-2018:1674) Important: rhvm-setup-plugins security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:30", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-06-07T18:23:37", "published": "2018-05-22T01:20:04", "id": "RHSA-2018:1647", "href": "https://access.redhat.com/errata/RHSA-2018:1647", "type": "redhat", "title": "(RHSA-2018:1647) Important: java-1.7.0-openjdk security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:45:37", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm-rhev packages provide the\nuser-space component for running virtual machines that use KVM in\nenvironments managed by Red Hat products.\n\nSecurity fix(es):\n* An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nAcknowledgements:\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center)\nand Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that\nincludes support for guests running on hosts with AMD processors.\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section.", "modified": "2018-08-07T18:12:26", "published": "2018-08-07T18:11:28", "id": "RHSA-2018:2364", "href": "https://access.redhat.com/errata/RHSA-2018:2364", "type": "redhat", "title": "(RHSA-2018:2364) Important: qemu-kvm-rhev security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:09", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T02:18:25", "published": "2018-05-22T02:08:26", "id": "RHSA-2018:1630", "href": "https://access.redhat.com/errata/RHSA-2018:1630", "type": "redhat", "title": "(RHSA-2018:1630) Important: kernel-rt security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:46:51", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nNote: This is the qemu-kvm-rhev side of the CVE-2018-3639 mitigation that includes support for guests running on hosts with AMD processors.\n\nBug Fix(es):\n\n* Previously, using device passthrough for a SCSI-2 device failed and returned an \"Illegal Request\" error. With this update, the QEMU emulator checks the SCSI version of the device when performing passthrough. As a result, the described problem no longer occurs. (BZ#1571370)\n \n* Under certain circumstances, resuming a paused guest generated redundant \"VIR_DOMAIN_PAUSED_UNKNOWN\" error messages in the libvirt log. This update corrects the event sending order when resuming guests, which prevents the errors being logged. (BZ#1582122)\n\nEnhancement(s):\n\n* With this update, Ceph storage is supported by KVM virtualization on all CPU architectures supported by Red Hat. (BZ#1588001)", "modified": "2018-06-27T12:14:14", "published": "2018-06-27T12:13:17", "id": "RHSA-2018:2060", "href": "https://access.redhat.com/errata/RHSA-2018:2060", "type": "redhat", "title": "(RHSA-2018:2060) Important: qemu-kvm-rhev security and bug fix update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-08-13T18:47:08", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.", "modified": "2018-05-22T03:12:49", "published": "2018-05-22T03:03:27", "id": "RHSA-2018:1668", "href": "https://access.redhat.com/errata/RHSA-2018:1668", "type": "redhat", "title": "(RHSA-2018:1668) Important: libvirt security update", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "kaspersky": [{"lastseen": "2020-09-02T11:45:03", "bulletinFamily": "info", "cvelist": ["CVE-2018-3639"], "description": "### *Detect date*:\n05/21/2018\n\n### *Severity*:\nWarning\n\n### *Description*:\nMicrosoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre and Meltdown). Also, a new subclass of speculative execution side channel vulnerabilities known as _Speculative Store Bypass (SSB)_ has been announced and assigned [CVE-2018-3639](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639>).\n\n### *Affected products*:\nWindows Server, version 1803 (Server Core Installation) \nWindows 10 for 32-bit Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 1703 for 32-bit Systems \nWindows 10 Version 1703 for x64-based Systems \nWindows 10 Version 1709 for 32-bit Systems \nWindows 10 Version 1709 for 64-based Systems \nWindows 10 Version 1803 for 32-bit Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2016 \nWindows Server 2016 (Server Core installation) \nWindows Server, version 1709 (Server Core Installation)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[ADV180012](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012>) \n\n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *KB list*:\n[4480960](<http://support.microsoft.com/kb/4480960>) \n[4480968](<http://support.microsoft.com/kb/4480968>) \n[4480957](<http://support.microsoft.com/kb/4480957>) \n[4480970](<http://support.microsoft.com/kb/4480970>)", "edition": 1, "modified": "2020-08-14T00:00:00", "published": "2018-05-21T00:00:00", "id": "KLA11893", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11893", "title": "\r KLA11893Microsoft Advisory for Microsoft Products (ESU) ", "type": "kaspersky", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-09-02T11:44:13", "bulletinFamily": "info", "cvelist": ["CVE-2018-3639"], "description": "### *Detect date*:\n05/21/2018\n\n### *Severity*:\nWarning\n\n### *Description*:\nOn January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre and Meltdown) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. On May 21st, a new subclass of speculative execution side channel vulnerabilities known as _Speculative Store Bypass (SSB)_ has been announced and assigned [CVE-2018-3639](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639>).\n\n### *Affected products*:\nWindows Server, version 1803 (Server Core Installation) \nWindows 10 for 32-bit Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 1607 for 32-bit Systems \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 1703 for 32-bit Systems \nWindows 10 Version 1703 for x64-based Systems \nWindows 10 Version 1709 for 32-bit Systems \nWindows 10 Version 1709 for 64-based Systems \nWindows 10 Version 1803 for 32-bit Systems \nWindows 10 Version 1803 for x64-based Systems \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows Server 2016 \nWindows Server 2016 (Server Core installation) \nWindows Server, version 1709 (Server Core Installation)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[ADV180012](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/ADV180012>) \n\n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[4467680](<http://support.microsoft.com/kb/4467680>) \n[4467708](<http://support.microsoft.com/kb/4467708>) \n[4467691](<http://support.microsoft.com/kb/4467691>) \n[4467702](<http://support.microsoft.com/kb/4467702>) \n[4467686](<http://support.microsoft.com/kb/4467686>) \n[4467696](<http://support.microsoft.com/kb/4467696>) \n[4480963](<http://support.microsoft.com/kb/4480963>) \n[4480964](<http://support.microsoft.com/kb/4480964>) \n[4480972](<http://support.microsoft.com/kb/4480972>) \n[4480975](<http://support.microsoft.com/kb/4480975>)", "edition": 31, "modified": "2020-07-22T00:00:00", "published": "2018-05-21T00:00:00", "id": "KLA11253", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11253", "title": "\r KLA11253Microsoft Advisory for Microsoft Windows ", "type": "kaspersky", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "suse": [{"lastseen": "2018-05-25T14:21:13", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The openSUSE Leap 15.0 kernel was updated to receive various security and\n bugfixes.\n\n The following security bugs were fixed:\n\n - CVE-2018-3639: Systems with microprocessors utilizing speculative\n execution and speculative execution of memory reads before the addresses\n of all prior memory writes are known may allow unauthorized disclosure\n of information to an attacker with local user access via a side-channel\n analysis, aka Speculative Store Bypass (SSB), Variant 4 (bsc#1087082).\n\n A new boot commandline option was introduced,\n "spec_store_bypass_disable", which can have following values:\n\n - auto: Kernel detects whether your CPU model contains an implementation\n of Speculative Store Bypass and picks the most appropriate mitigation.\n - on: disable Speculative Store Bypass\n - off: enable Speculative Store Bypass\n - prctl: Control Speculative Store Bypass per thread via prctl.\n Speculative Store Bypass is enabled for a process by default. The\n state of the control is inherited on fork.\n - seccomp: Same as "prctl" above, but all seccomp threads will disable\n SSB unless they explicitly opt out.\n\n The default is "seccomp", meaning programs need explicit opt-in into the\n mitigation.\n\n Status can be queried via the\n /sys/devices/system/cpu/vulnerabilities/spec_store_bypass file, containing:\n\n - "Vulnerable"\n - "Mitigation: Speculative Store Bypass disabled"\n - "Mitigation: Speculative Store Bypass disabled via prctl"\n - "Mitigation: Speculative Store Bypass disabled via prctl and seccomp"\n\n The following non-security bugs were fixed:\n\n - allow_unsupported: add module tainting on feature use (FATE#323394).\n - powerpc/64/kexec: fix race in kexec when XIVE is shutdown (bsc#1088273).\n - reiserfs: mark read-write mode unsupported (FATE#323394).\n - reiserfs: package in separate KMP (FATE#323394).\n\n", "edition": 1, "modified": "2018-05-25T11:32:13", "published": "2018-05-25T11:32:13", "id": "OPENSUSE-SU-2018:1420-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-05/msg00101.html", "title": "Security update for the Linux Kernel (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2018-08-13T14:54:46", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update for libvirt fixes the following issues:\n\n Security issue fixed:\n\n - CVE-2018-3639: Add support for 'ssbd' and 'virt-ssbd' CPUID feature bits\n to address V4 Speculative Store Bypass aka "Memory Disambiguation"\n (bsc#1092885).\n\n Bug fixes:\n\n - bsc#1094325: Enable virsh blockresize for XEN guests (FATE#325467).\n - bsc#1095556: Fix qemu VM creating with --boot uefi due to missing\n AppArmor profile.\n - bsc#1094725: Fix `virsh blockresize` to work with Xen qdisks.\n - bsc#1094480: Fix `virsh list` to list domains with `xl list`.\n - bsc#1087416: Fix missing video device within guest with default\n installation by virt-mamanger.\n - bsc#1079150: Fix libvirt-guests start dependency.\n - bsc#1076861: Fix locking of lockspace resource\n '/devcfs/disks/uatidmsvn1-xvda'.\n - bsc#1074014: Fix KVM live migration when shutting down cluster node.\n - bsc#959329: Fix wrong state of VMs in virtual manager.\n\n This update was imported from the SUSE:SLE-12-SP3:Update update project.\n\n", "edition": 1, "modified": "2018-08-13T12:07:25", "published": "2018-08-13T12:07:25", "id": "OPENSUSE-SU-2018:2306-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-08/msg00043.html", "title": "Security update for libvirt (moderate)", "type": "suse", "cvss": {"score": 4.9, "vector": "AV:LOCAL/AC:LOW/Au:NONE/C:COMPLETE/I:NONE/A:NONE/"}}, {"lastseen": "2018-06-13T19:43:23", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "This update for qemu fixes the following issues:\n\n This security issue was fixed:\n\n - CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM\n guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and\n speculative execution of memory reads before the addresses of all prior\n memory writes are known may allow unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named "ssbd" to be\n presented to the guest, given that the host has this feature, and KVM\n exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n -cpu $MODEL,+spec-ctrl,+ssbd so the guest OS can take advantage of the\n feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\n This non-security issue was fixed:\n\n - Fix qemu-guest-agent uninstall (boo#1093169)\n\n", "edition": 1, "modified": "2018-06-09T15:11:25", "published": "2018-06-09T15:11:25", "id": "OPENSUSE-SU-2018:1628-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2018-06/msg00018.html", "title": "Security update for qemu (important)", "type": "suse", "cvss": {"score": 0.0, "vector": "NONE"}}], "threatpost": [{"lastseen": "2019-05-30T05:52:39", "bulletinFamily": "info", "cvelist": ["CVE-2018-3639"], "description": "Spectre and Meltdown fixes for Intel chips announced in March, to be embedded into new CPUs, do not address the newly disclosed Variant 4, sources said.\n\nIntel introduced hardware-based [safeguards](<https://threatpost.com/intel-details-cpu-virtual-fences-fix-as-safeguard-against-spectre-meltdown-flaws/130501/>) to its new chips to protect against the Spectre and Meltdown flaws that rocked the silicon industry when the vulnerabilities were made public in early 2018. However, those protections are specific to V2 and V3, and will not impact the newly-discovered Variant 4 as well as other potential speculative execution side channel-related flaws [in the future](<https://threatpost.com/researchers-say-more-spectre-related-cpu-flaws-on-horizon/132199/>), sources familiar with the situation told Threatpost.\n\nThat said, chip experts familiar with the situation said that while these \u201cprotective walls\u201d will not impact Variant 4, Intel has added a functionality into its microcode \u2013 the Speculative Store Bypass Disable (SSBD) bit \u2013 to protect against Variant 4. This functionality will continue to be utilized on future hardware platforms.\n\nOn Monday, Intel acknowledged that its processors are vulnerable to Variant 4, which could give attackers unauthorized read access to memory. Similar to the Meltdown and Spectre vulnerabilities, Variant 4 ([CVE-2018-3639](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639>)) is also a side channel analysis security flaw. However, Variant 4 uses a different process to extract information and is more of a cache exploit and that can be used in browser-based attacks.\n\nAfter the disclosure of Spectre and Meltdown, Intel said earlier this year it has designed a new set of CPU design features that work with the operating system to install \u201cvirtual fences\u201d protecting the system from speculative execution attacks that could exploit a variant of the Spectre flaw.\n\n\u201cWe have redesigned parts of the processor to introduce new levels of protection through partitioning that will protect against both Variants 2 and 3,\u201d Brian Krzanich, CEO of Intel, said in a blog [post](<https://newsroom.intel.com/editorials/advancing-security-silicon-level/>) at the time. \u201cThink of this partitioning as additional \u2018protective walls\u2019 between applications and user privilege levels to create an obstacle for bad actors.\u201d\n\nKrzanich said the new safeguards will be built into Intel\u2019s next-generation Xeon Scalable processors, code-named Cascade Lake, as well as Intel\u2019s eighth-gen Core processors that are expected to ship in the second half of 2018.\n\nPatrick Moorhead, principal analyst at Moor Insights and Strategy, said that Variant 4 would be much harder to \u201cfix\u201d architecturally than V1, V2, or V3a.\n\n\u201cYou either have to turn memory disambiguation on or off, which will be a BIOS setting,\u201d he told Threatpost in an email. \u201cIt\u2019s important to note that browsers have already included mitigations and that from a severity standpoint, has been flagged as \u2018medium\u2019 severity, compared to V1, V2, and V3, which were flagged as \u2018high.'\u201d\n\nVariant 4 is most similar to Spectre V1 as opposed to Variant 2 or Variant 3, Moorhead said: \u201cGPZv1 was exploiting the nature of the processor\u2019s branch prediction. GPZv4 is taking advantage of a performance feature where the processor reorders loads/stores (memory disambiguation) to gain performance,\u201d he said.\n\nLeslie Culbertson, executive vice president and general manager of Product Assurance and Security at Intel, said in a [post](<https://newsroom.intel.com/editorials/addressing-new-research-for-side-channel-analysis/>) on Monday, that unlike Intel\u2019s updates for other variants, the updates for Variant 4 will be optional and will be set to \u201coff\u201d by default.\n\n\u201cWe\u2019ve already delivered the microcode update for Variant 4 in beta form to OEM system manufacturers and system software vendors, and we expect it will be released into production BIOS and software updates over the coming weeks,\u201d she wrote.\n", "modified": "2018-05-24T15:18:03", "published": "2018-05-24T15:18:03", "id": "THREATPOST:F646E92307240E4B7D00CC0FC73BCE0D", "href": "https://threatpost.com/intels-virtual-fences-spectre-fix-wont-protect-against-variant-4/132246/", "type": "threatpost", "title": "Intel\u2019s \u2018Virtual Fences\u2019 Spectre Fix Won\u2019t Protect Against Variant 4", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "openvas": [{"lastseen": "2020-01-27T18:36:29", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220181271", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220181271", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for kvm (EulerOS-SA-2018-1271)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2018.1271\");\n script_version(\"2020-01-23T11:19:41+0000\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 11:19:41 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 11:19:41 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for kvm (EulerOS-SA-2018-1271)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRT-2\\.5\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2018-1271\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2018-1271\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'kvm' package(s) announced via the EulerOS-SA-2018-1271 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.(CVE-2018-3639)\");\n\n script_tag(name:\"affected\", value:\"'kvm' package(s) on Huawei EulerOS Virtualization 2.5.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRT-2.5.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"kvm\", rpm:\"kvm~4.4.11~421\", rls:\"EULEROSVIRT-2.5.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of kernel", "modified": "2019-03-08T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310882887", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882887", "type": "openvas", "title": "CentOS Update for kernel CESA-2018:1651 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_1651_kernel_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for kernel CESA-2018:1651 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882887\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 05:40:42 +0200 (Wed, 23 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for kernel CESA-2018:1651 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of kernel\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software side of the\nmitigation for this hardware issue. To be fully functional, up-to-date CPU\nmicrocode applied on the system is required. Please refer to References\nsection for further information about this issue, CPU microcode\nrequirements and the potential performance impact.\n\nIn this update mitigations for x86 (both 32 and 64 bit) architecture are\nprovided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n * Previously, an erroneous code in the x86 kexec system call path caused a\nmemory corruption. As a consequence, the system became unresponsive with\nthe following kernel stack trace:\n\n'WARNING: CPU: 13 PID: 36409 at lib/list_debug.c:59\n__list_del_entry+0xa1/0xd0 list_del corruption. prev- next should be\nffffdd03fddeeca0, but was (null)'\n\nThis update ensures that the code does not corrupt memory. As a result, the\noperating system no longer hangs. (BZ#1573176)\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1651\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022835.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-firmware\", rpm:\"kernel-firmware~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~2.6.32~696.30.1.el6\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of libvirt", "modified": "2019-03-08T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310882888", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882888", "type": "openvas", "title": "CentOS Update for libvirt CESA-2018:1632 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_1632_libvirt_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for libvirt CESA-2018:1632 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882888\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 05:40:45 +0200 (Wed, 23 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for libvirt CESA-2018:1632 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of libvirt\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\");\n script_tag(name:\"affected\", value:\"libvirt on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1632\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022840.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-admin\", rpm:\"libvirt-admin~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-client\", rpm:\"libvirt-client~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon\", rpm:\"libvirt-daemon~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-config-network\", rpm:\"libvirt-daemon-config-network~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-config-nwfilter\", rpm:\"libvirt-daemon-config-nwfilter~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-interface\", rpm:\"libvirt-daemon-driver-interface~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-lxc\", rpm:\"libvirt-daemon-driver-lxc~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-network\", rpm:\"libvirt-daemon-driver-network~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-nodedev\", rpm:\"libvirt-daemon-driver-nodedev~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-nwfilter\", rpm:\"libvirt-daemon-driver-nwfilter~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-qemu\", rpm:\"libvirt-daemon-driver-qemu~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-secret\", rpm:\"libvirt-daemon-driver-secret~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage\", rpm:\"libvirt-daemon-driver-storage~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-core\", rpm:\"libvirt-daemon-driver-storage-core~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-disk\", rpm:\"libvirt-daemon-driver-storage-disk~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-gluster\", rpm:\"libvirt-daemon-driver-storage-gluster~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-iscsi\", rpm:\"libvirt-daemon-driver-storage-iscsi~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-logical\", rpm:\"libvirt-daemon-driver-storage-logical~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-mpath\", rpm:\"libvirt-daemon-driver-storage-mpath~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-rbd\", rpm:\"libvirt-daemon-driver-storage-rbd~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-driver-storage-scsi\", rpm:\"libvirt-daemon-driver-storage-scsi~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-kvm\", rpm:\"libvirt-daemon-kvm~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-daemon-lxc\", rpm:\"libvirt-daemon-lxc~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-devel\", rpm:\"libvirt-devel~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-docs\", rpm:\"libvirt-docs~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-libs\", rpm:\"libvirt-libs~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-lock-sanlock\", rpm:\"libvirt-lock-sanlock~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-login-shell\", rpm:\"libvirt-login-shell~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-nss\", rpm:\"libvirt-nss~3.9.0~14.el7_5.5\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of libvirt", "modified": "2019-03-08T00:00:00", "published": "2018-05-30T00:00:00", "id": "OPENVAS:1361412562310882890", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882890", "type": "openvas", "title": "CentOS Update for libvirt CESA-2018:1669 centos6", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_1669_libvirt_centos6.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for libvirt CESA-2018:1669 centos6\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882890\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-30 05:46:47 +0200 (Wed, 30 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for libvirt CESA-2018:1669 centos6\");\n script_tag(name:\"summary\", value:\"Check the version of libvirt\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The libvirt library contains a C API for managing and interacting with the\nvirtualization capabilities of Linux and other operating systems. In\naddition, libvirt provides tools for remote management of virtualized\nsystems.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\");\n script_tag(name:\"affected\", value:\"libvirt on CentOS 6\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1669\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022845.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS6\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS6\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~0.10.2~62.el6_9.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-client\", rpm:\"libvirt-client~0.10.2~62.el6_9.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-devel\", rpm:\"libvirt-devel~0.10.2~62.el6_9.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-python\", rpm:\"libvirt-python~0.10.2~62.el6_9.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"libvirt-lock-sanlock\", rpm:\"libvirt-lock-sanlock~0.10.2~62.el6_9.2\", rls:\"CentOS6\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:22", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "The remote host is missing an update for the ", "modified": "2019-03-18T00:00:00", "published": "2018-06-13T00:00:00", "id": "OPENVAS:1361412562310843558", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843558", "type": "openvas", "title": "Ubuntu Update for qemu USN-3679-1", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ubuntu_USN_3679_1.nasl 14288 2019-03-18 16:34:17Z cfischer $\n#\n# Ubuntu Update for qemu USN-3679-1\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843558\");\n script_version(\"$Revision: 14288 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 17:34:17 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-13 05:54:32 +0200 (Wed, 13 Jun 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Ubuntu Update for qemu USN-3679-1\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on\nthe target host.\");\n script_tag(name:\"insight\", value:\"Ken Johnson and Jann Horn independently\ndiscovered that microprocessors utilizing speculative execution of a memory read may\nallow unauthorized memory reads via sidechannel attacks. An attacker in the guest could use\nthis to expose sensitive guest information, including kernel memory. This\nupdate allows QEMU to expose new CPU features added by AMD microcode\nupdates to guests on amd64 and i386.\");\n script_tag(name:\"affected\", value:\"qemu on Ubuntu 18.04 LTS,\n Ubuntu 17.10,\n Ubuntu 16.04 LTS,\n Ubuntu 14.04 LTS\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"USN\", value:\"3679-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3679-1/\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=UBUNTU(14\\.04 LTS|17\\.10|18\\.04 LTS|16\\.04 LTS)\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"UBUNTU14.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu\", ver:\"2.0.0+dfsg-2ubuntu1.43\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"2.0.0+dfsg-2ubuntu1.43\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"2.0.0+dfsg-2ubuntu1.43\", rls:\"UBUNTU14.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU17.10\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu\", ver:\"1:2.10+dfsg-0ubuntu3.8\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"1:2.10+dfsg-0ubuntu3.8\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"1:2.10+dfsg-0ubuntu3.8\", rls:\"UBUNTU17.10\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU18.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu\", ver:\"1:2.11+dfsg-1ubuntu7.3\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"1:2.11+dfsg-1ubuntu7.3\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"1:2.11+dfsg-1ubuntu7.3\", rls:\"UBUNTU18.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n\n\nif(release == \"UBUNTU16.04 LTS\")\n{\n\n if ((res = isdpkgvuln(pkg:\"qemu\", ver:\"1:2.5+dfsg-5ubuntu10.30\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system\", ver:\"1:2.5+dfsg-5ubuntu10.30\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isdpkgvuln(pkg:\"qemu-system-x86\", ver:\"1:2.5+dfsg-5ubuntu10.30\", rls:\"UBUNTU16.04 LTS\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of qemu-img", "modified": "2019-03-08T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310882884", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882884", "type": "openvas", "title": "CentOS Update for qemu-img CESA-2018:1633 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_1633_qemu-img_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for qemu-img CESA-2018:1633 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882884\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 05:40:32 +0200 (Wed, 23 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for qemu-img CESA-2018:1633 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of qemu-img\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"Kernel-based Virtual Machine (KVM) is a full virtualization solution for\nLinux on a variety of architectures. The qemu-kvm packages provide the\nuser-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\");\n script_tag(name:\"affected\", value:\"qemu-img on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1633\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022842.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"qemu-img\", rpm:\"qemu-img~1.5.3~156.el7_5.2\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~1.5.3~156.el7_5.2\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-common\", rpm:\"qemu-kvm-common~1.5.3~156.el7_5.2\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"qemu-kvm-tools\", rpm:\"qemu-kvm-tools~1.5.3~156.el7_5.2\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:25", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of kernel", "modified": "2019-03-08T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310882885", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882885", "type": "openvas", "title": "CentOS Update for kernel CESA-2018:1629 centos7", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_CESA-2018_1629_kernel_centos7.nasl 14058 2019-03-08 13:25:52Z cfischer $\n#\n# CentOS Update for kernel CESA-2018:1629 centos7\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882885\");\n script_version(\"$Revision: 14058 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-08 14:25:52 +0100 (Fri, 08 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 05:40:36 +0200 (Wed, 23 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for kernel CESA-2018:1629 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of kernel\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load and Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via\nsoftware update. The updated kernel packages provide software side of the\nmitigation for this hardware issue. To be fully functional, up-to-date CPU\nmicrocode applied on the system is required. Please refer to References\nsection for further information about this issue, CPU microcode\nrequirements and the potential performance impact.\n\nIn this update mitigations for x86-64 architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\");\n script_tag(name:\"affected\", value:\"kernel on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1629\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022843.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"CentOS7\")\n{\n\n if ((res = isrpmvuln(pkg:\"kernel\", rpm:\"kernel~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-abi-whitelists\", rpm:\"kernel-abi-whitelists~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug\", rpm:\"kernel-debug~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-debug-devel\", rpm:\"kernel-debug-devel~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-devel\", rpm:\"kernel-devel~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-doc\", rpm:\"kernel-doc~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-headers\", rpm:\"kernel-headers~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools\", rpm:\"kernel-tools~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs\", rpm:\"kernel-tools-libs~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"kernel-tools-libs-devel\", rpm:\"kernel-tools-libs-devel~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"perf\", rpm:\"perf~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if ((res = isrpmvuln(pkg:\"python-perf\", rpm:\"python-perf~3.10.0~862.3.2.el7\", rls:\"CentOS7\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-03-14T18:26:43", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "Check the version of java", "modified": "2020-03-13T00:00:00", "published": "2018-05-23T00:00:00", "id": "OPENVAS:1361412562310882882", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310882882", "type": "openvas", "title": "CentOS Update for java CESA-2018:1649 centos7", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.882882\");\n script_version(\"2020-03-13T09:49:59+0000\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 09:49:59 +0000 (Fri, 13 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-05-23 05:40:26 +0200 (Wed, 23 May 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"CentOS Update for java CESA-2018:1649 centos7\");\n script_tag(name:\"summary\", value:\"Check the version of java\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"insight\", value:\"The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime\nEnvironment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n * An industry-wide issue was found in the way many modern microprocessor\ndesigns have implemented speculative execution of Load & Store instructions\n(a commonly used performance optimization). It relies on the presence of a\nprecisely-defined instruction sequence in the privileged code as well as\nthe fact that memory read from address to which a recent memory write has\noccurred may see an older value and subsequently cause an update into the\nmicroprocessor's data cache even for speculatively executed instructions\nthat never actually commit (retire). As a result, an unprivileged attacker\ncould use this flaw to read privileged memory by conducting targeted cache\nside-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response\nCenter) and Jann Horn (Google Project Zero) for reporting this issue.\");\n script_tag(name:\"affected\", value:\"java on CentOS 7\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"CESA\", value:\"2018:1649\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2018-May/022839.html\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"CentOS7\") {\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk\", rpm:\"java-1.8.0-openjdk~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-accessibility\", rpm:\"java-1.8.0-openjdk-accessibility~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-accessibility-debug\", rpm:\"java-1.8.0-openjdk-accessibility-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-debug\", rpm:\"java-1.8.0-openjdk-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo\", rpm:\"java-1.8.0-openjdk-demo~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-demo-debug\", rpm:\"java-1.8.0-openjdk-demo-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel\", rpm:\"java-1.8.0-openjdk-devel~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-devel-debug\", rpm:\"java-1.8.0-openjdk-devel-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless\", rpm:\"java-1.8.0-openjdk-headless~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-headless-debug\", rpm:\"java-1.8.0-openjdk-headless-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc\", rpm:\"java-1.8.0-openjdk-javadoc~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-debug\", rpm:\"java-1.8.0-openjdk-javadoc-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-zip\", rpm:\"java-1.8.0-openjdk-javadoc-zip~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-javadoc-zip-debug\", rpm:\"java-1.8.0-openjdk-javadoc-zip-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src\", rpm:\"java-1.8.0-openjdk-src~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"java-1.8.0-openjdk-src-debug\", rpm:\"java-1.8.0-openjdk-src-debug~1.8.0.171~8.b10.el7_5\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:33:11", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2018-06-22T00:00:00", "id": "OPENVAS:1361412562310874720", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310874720", "type": "openvas", "title": "Fedora Update for libvirt FEDORA-2018-527698a904", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_fedora_2018_527698a904_libvirt_fc28.nasl 14223 2019-03-15 13:49:35Z cfischer $\n#\n# Fedora Update for libvirt FEDORA-2018-527698a904\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2018 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.874720\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2018-06-22 06:02:25 +0200 (Fri, 22 Jun 2018)\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for libvirt FEDORA-2018-527698a904\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'libvirt'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"libvirt on Fedora 28\");\n script_tag(name:\"solution\", value:\"Please install the updated packages.\");\n\n script_xref(name:\"FEDORA\", value:\"2018-527698a904\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ6FHD2X5JQC5GT42HY5H4MLDEPQHPAX\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC28\")\n{\n\n if ((res = isrpmvuln(pkg:\"libvirt\", rpm:\"libvirt~4.1.0~3.fc28\", rls:\"FC28\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-01-31T17:38:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-3639"], "description": "The remote host is missing an update for the ", "modified": "2020-01-31T00:00:00", "published": "2018-10-26T00:00:00", "id": "OPENVAS:1361412562310852029", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310852029", "type": "openvas", "title": "openSUSE: Security Advisory for qemu (openSUSE-SU-2018:1628-1)", "sourceData": "# Copyright (C) 2018 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.852029\");\n script_version(\"2020-01-31T08:23:39+0000\");\n script_cve_id(\"CVE-2018-3639\");\n script_tag(name:\"cvss_base\", value:\"4.9\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:L/AC:L/Au:N/C:C/I:N/A:N\");\n script_tag(name:\"last_modification\", value:\"2020-01-31 08:23:39 +0000 (Fri, 31 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2018-10-26 06:35:40 +0200 (Fri, 26 Oct 2018)\");\n script_name(\"openSUSE: Security Advisory for qemu (openSUSE-SU-2018:1628-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2018 Greenbone Networks GmbH\");\n script_family(\"SuSE Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/suse\", \"ssh/login/rpms\", re:\"ssh/login/release=openSUSELeap15\\.0\");\n\n script_xref(name:\"openSUSE-SU\", value:\"2018:1628-1\");\n script_xref(name:\"URL\", value:\"https://lists.opensuse.org/opensuse-security-announce/2018-06/msg00018.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'qemu'\n package(s) announced via the openSUSE-SU-2018:1628-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"This update for qemu fixes the following issues:\n\n This security issue was fixed:\n\n - CVE-2018-3639: Spectre v4 vulnerability mitigation support for KVM\n guests (bsc#1092885).\n\n Systems with microprocessors utilizing speculative execution and\n speculative execution of memory reads before the addresses of all prior\n memory writes are known may allow unauthorized disclosure of information\n to an attacker with local user access via a side-channel analysis.\n\n This patch permits the new x86 cpu feature flag named 'ssbd' to be\n presented to the guest, given that the host has this feature, and KVM\n exposes it to the guest as well.\n\n For this feature to be enabled please use the qemu commandline\n\n - cpu $MODEL, +spec-ctrl, +ssbd so the guest OS can take advantage of the\n feature.\n\n spec-ctrl and ssbd support is also required in the host.\n\n This non-security issue was fixed:\n\n - Fix qemu-guest-agent uninstall (boo#1093169)\n\n Patch Instructions:\n\n To install this openSUSE Security Update use the SUSE recommended\n installation methods\n like YaST online_update or 'zypper patch'.\n\n Alternatively you can run the command listed for your product:\n\n - openSUSE Leap 15.0:\n\n zypper in -t patch openSUSE-2018-603=1\");\n\n script_tag(name:\"affected\", value:\"qemu on openSUSE Leap 15.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"openSUSELeap15.0\") {\n if(!isnull(res = isrpmvuln(pkg:\"qemu\", rpm:\"qemu~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-arm\", rpm:\"qemu-arm~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-arm-debuginfo\", rpm:\"qemu-arm-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl\", rpm:\"qemu-block-curl~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-curl-debuginfo\", rpm:\"qemu-block-curl-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-dmg\", rpm:\"qemu-block-dmg~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-dmg-debuginfo\", rpm:\"qemu-block-dmg-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-gluster\", rpm:\"qemu-block-gluster~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-gluster-debuginfo\", rpm:\"qemu-block-gluster-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-iscsi\", rpm:\"qemu-block-iscsi~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-iscsi-debuginfo\", rpm:\"qemu-block-iscsi-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-rbd\", rpm:\"qemu-block-rbd~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-rbd-debuginfo\", rpm:\"qemu-block-rbd-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-ssh\", rpm:\"qemu-block-ssh~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-block-ssh-debuginfo\", rpm:\"qemu-block-ssh-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-debuginfo\", rpm:\"qemu-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-debugsource\", rpm:\"qemu-debugsource~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-extra\", rpm:\"qemu-extra~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-extra-debuginfo\", rpm:\"qemu-extra-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-guest-agent\", rpm:\"qemu-guest-agent~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-guest-agent-debuginfo\", rpm:\"qemu-guest-agent-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ksm\", rpm:\"qemu-ksm~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-kvm\", rpm:\"qemu-kvm~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-lang\", rpm:\"qemu-lang~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-linux-user\", rpm:\"qemu-linux-user~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-linux-user-debuginfo\", rpm:\"qemu-linux-user-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-linux-user-debugsource\", rpm:\"qemu-linux-user-debugsource~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ppc\", rpm:\"qemu-ppc~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ppc-debuginfo\", rpm:\"qemu-ppc-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-s390\", rpm:\"qemu-s390~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-s390-debuginfo\", rpm:\"qemu-s390-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-testsuite\", rpm:\"qemu-testsuite~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools\", rpm:\"qemu-tools~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-tools-debuginfo\", rpm:\"qemu-tools-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86\", rpm:\"qemu-x86~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-x86-debuginfo\", rpm:\"qemu-x86-debuginfo~2.11.1~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-ipxe\", rpm:\"qemu-ipxe~1.0.0~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-seabios\", rpm:\"qemu-seabios~1.11.0~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-sgabios\", rpm:\"qemu-sgabios~8~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"qemu-vgabios\", rpm:\"qemu-vgabios~1.11.0~lp150.7.3.1\", rls:\"openSUSELeap15.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "oraclelinux": [{"lastseen": "2020-10-22T17:02:31", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "[1:1.7.0.181-2.6.14.8.0.1]\n- Update DISTRO_NAME in specfile\n[1:1.7.0.181-2.6.14.8]\n- added and applied 1566890_embargoed20180521.patch\n- Resolves: rhbz#1578560", "edition": 6, "modified": "2018-05-22T00:00:00", "published": "2018-05-22T00:00:00", "id": "ELSA-2018-1648", "href": "http://linux.oracle.com/errata/ELSA-2018-1648.html", "title": "java-1.7.0-openjdk security update", "type": "oraclelinux", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2019-05-29T18:37:47", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "[1:1.8.0.171-8.b10]\n- added and applied 1566890_embargoed20180521.patch\n- Resolves: rhbz#1578545", "edition": 5, "modified": "2018-05-22T00:00:00", "published": "2018-05-22T00:00:00", "id": "ELSA-2018-1650", "href": "http://linux.oracle.com/errata/ELSA-2018-1650.html", "title": "java-1.8.0-openjdk security update", "type": "oraclelinux", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "The OpenJDK runtime environment 8. ", "modified": "2019-08-11T01:42:38", "published": "2019-08-11T01:42:38", "id": "FEDORA:D9EAD6149F94", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: java-1.8.0-openjdk-1.8.0.222.b10-0.fc29", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-12-21T08:17:54", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "QEMU is a generic and open source processor emulator which achieves a good emulation speed by using dynamic translation. QEMU has two operating modes: * Full system emulation. In this mode, QEMU emulates a full system (for example a PC), including a processor and various peripherials. It can be used to launch different Operating Systems without rebooting the PC or to debug system code. * User mode emulation. In this mode, QEMU can launch Linux processes compi led for one CPU on another CPU. As QEMU requires no host kernel patches to run, it is safe and easy to use. ", "modified": "2018-06-21T15:02:25", "published": "2018-06-21T15:02:25", "id": "FEDORA:E6FC960603E5", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: qemu-2.11.1-3.fc28", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "centos": [{"lastseen": "2020-12-08T03:34:17", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**CentOS Errata and Security Advisory** CESA-2018:1651\n\n\nThe kernel packages contain the Linux kernel, the core of any Linux operating system.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This issue is present in hardware and cannot be fully fixed via software update. The updated kernel packages provide software side of the mitigation for this hardware issue. To be fully functional, up-to-date CPU microcode applied on the system is required. Please refer to References section for further information about this issue, CPU microcode requirements and the potential performance impact.\n\nIn this update mitigations for x86 (both 32 and 64 bit) architecture are provided.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\nBug Fix(es):\n\n* Previously, an erroneous code in the x86 kexec system call path caused a memory corruption. As a consequence, the system became unresponsive with the following kernel stack trace:\n\n'WARNING: CPU: 13 PID: 36409 at lib/list_debug.c:59 __list_del_entry+0xa1/0xd0 list_del corruption. prev->next should be ffffdd03fddeeca0, but was (null)'\n\nThis update ensures that the code does not corrupt memory. As a result, the operating system no longer hangs. (BZ#1573176)\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-May/034873.html\n\n**Affected packages:**\nkernel\nkernel-abi-whitelists\nkernel-debug\nkernel-debug-devel\nkernel-devel\nkernel-doc\nkernel-firmware\nkernel-headers\nperf\npython-perf\n\n**Upstream details at:**\n", "edition": 5, "modified": "2018-05-22T15:35:50", "published": "2018-05-22T15:35:50", "id": "CESA-2018:1651", "href": "http://lists.centos.org/pipermail/centos-announce/2018-May/034873.html", "title": "kernel, perf, python security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-12-08T03:37:32", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**CentOS Errata and Security Advisory** CESA-2018:1647\n\n\nThe java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environment and the OpenJDK 7 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the OpenJDK side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-May/034872.html\n\n**Affected packages:**\njava-1.7.0-openjdk\njava-1.7.0-openjdk-demo\njava-1.7.0-openjdk-devel\njava-1.7.0-openjdk-javadoc\njava-1.7.0-openjdk-src\n\n**Upstream details at:**\n", "edition": 5, "modified": "2018-05-22T15:32:03", "published": "2018-05-22T15:32:03", "id": "CESA-2018:1647", "href": "http://lists.centos.org/pipermail/centos-announce/2018-May/034872.html", "title": "java security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-12-08T03:39:46", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**CentOS Errata and Security Advisory** CESA-2018:1660\n\n\nKernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the qemu-kvm side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-May/034875.html\n\n**Affected packages:**\nqemu-guest-agent\nqemu-img\nqemu-kvm\nqemu-kvm-tools\n\n**Upstream details at:**\n", "edition": 5, "modified": "2018-05-22T15:38:23", "published": "2018-05-22T15:38:23", "id": "CESA-2018:1660", "href": "http://lists.centos.org/pipermail/centos-announce/2018-May/034875.html", "title": "qemu security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-12-08T03:40:04", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**CentOS Errata and Security Advisory** CESA-2018:1669\n\n\nThe libvirt library contains a C API for managing and interacting with the virtualization capabilities of Linux and other operating systems. In addition, libvirt provides tools for remote management of virtualized systems.\n\nSecurity Fix(es):\n\n* An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. (CVE-2018-3639)\n\nNote: This is the libvirt side of the CVE-2018-3639 mitigation.\n\nRed Hat would like to thank Ken Johnson (Microsoft Security Response Center) and Jann Horn (Google Project Zero) for reporting this issue.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2018-May/034883.html\n\n**Affected packages:**\nlibvirt\nlibvirt-client\nlibvirt-devel\nlibvirt-lock-sanlock\nlibvirt-python\n\n**Upstream details at:**\n", "edition": 5, "modified": "2018-05-25T16:38:28", "published": "2018-05-25T16:38:28", "id": "CESA-2018:1669", "href": "http://lists.centos.org/pipermail/centos-announce/2018-May/034883.html", "title": "libvirt security update", "type": "centos", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "amazon": [{"lastseen": "2020-11-10T12:34:47", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**Issue Overview:**\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.([CVE-2018-3639 __](<https://access.redhat.com/security/cve/CVE-2018-3639>))\n\n \n**Affected Packages:** \n\n\nlibvirt\n\n \n**Issue Correction:** \nRun _yum update libvirt_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n src: \n libvirt-3.9.0-14.amzn2.5.src \n \n x86_64: \n libvirt-3.9.0-14.amzn2.5.x86_64 \n libvirt-docs-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-config-network-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-config-nwfilter-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-network-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-nwfilter-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-nodedev-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-interface-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-secret-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-core-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-logical-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-disk-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-scsi-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-iscsi-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-mpath-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-gluster-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-rbd-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-storage-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-qemu-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-driver-lxc-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-kvm-3.9.0-14.amzn2.5.x86_64 \n libvirt-daemon-lxc-3.9.0-14.amzn2.5.x86_64 \n libvirt-client-3.9.0-14.amzn2.5.x86_64 \n libvirt-libs-3.9.0-14.amzn2.5.x86_64 \n libvirt-admin-3.9.0-14.amzn2.5.x86_64 \n libvirt-login-shell-3.9.0-14.amzn2.5.x86_64 \n libvirt-devel-3.9.0-14.amzn2.5.x86_64 \n libvirt-lock-sanlock-3.9.0-14.amzn2.5.x86_64 \n libvirt-nss-3.9.0-14.amzn2.5.x86_64 \n libvirt-debuginfo-3.9.0-14.amzn2.5.x86_64 \n \n \n", "edition": 1, "modified": "2018-06-07T23:33:00", "published": "2018-06-07T23:33:00", "id": "ALAS2-2018-1033", "href": "https://alas.aws.amazon.com/AL2/ALAS-2018-1033.html", "title": "Important: libvirt", "type": "amazon", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-11-10T12:37:25", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**Issue Overview:**\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.([CVE-2018-3639 __](<https://access.redhat.com/security/cve/CVE-2018-3639>))\n\n \n**Affected Packages:** \n\n\njava-1.8.0-openjdk\n\n \n**Issue Correction:** \nRun _yum update java-1.8.0-openjdk_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n noarch: \n java-1.8.0-openjdk-javadoc-1.8.0.171-8.b10.amzn2.noarch \n java-1.8.0-openjdk-javadoc-zip-1.8.0.171-8.b10.amzn2.noarch \n java-1.8.0-openjdk-javadoc-debug-1.8.0.171-8.b10.amzn2.noarch \n java-1.8.0-openjdk-javadoc-zip-debug-1.8.0.171-8.b10.amzn2.noarch \n \n src: \n java-1.8.0-openjdk-1.8.0.171-8.b10.amzn2.src \n \n x86_64: \n java-1.8.0-openjdk-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-headless-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-headless-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-devel-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-devel-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-demo-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-demo-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-src-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-src-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-accessibility-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-accessibility-debug-1.8.0.171-8.b10.amzn2.x86_64 \n java-1.8.0-openjdk-debuginfo-1.8.0.171-8.b10.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2018-06-08T18:10:00", "published": "2018-06-08T18:10:00", "id": "ALAS2-2018-1039", "href": "https://alas.aws.amazon.com/AL2/ALAS-2018-1039.html", "title": "Important: java-1.8.0-openjdk", "type": "amazon", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}, {"lastseen": "2020-11-10T12:35:25", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "**Issue Overview:**\n\nAn industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization). It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks.([CVE-2018-3639 __](<https://access.redhat.com/security/cve/CVE-2018-3639>))\n\n \n**Affected Packages:** \n\n\njava-1.7.0-openjdk\n\n \n**Issue Correction:** \nRun _yum update java-1.7.0-openjdk_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n noarch: \n java-1.7.0-openjdk-javadoc-1.7.0.181-2.6.14.8.amzn2.noarch \n \n src: \n java-1.7.0-openjdk-1.7.0.181-2.6.14.8.amzn2.src \n \n x86_64: \n java-1.7.0-openjdk-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-headless-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-devel-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-demo-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-src-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-accessibility-1.7.0.181-2.6.14.8.amzn2.x86_64 \n java-1.7.0-openjdk-debuginfo-1.7.0.181-2.6.14.8.amzn2.x86_64 \n \n \n", "edition": 1, "modified": "2018-06-08T18:05:00", "published": "2018-06-08T18:05:00", "id": "ALAS2-2018-1037", "href": "https://alas.aws.amazon.com/AL2/ALAS-2018-1037.html", "title": "Important: java-1.7.0-openjdk", "type": "amazon", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}], "ubuntu": [{"lastseen": "2020-07-02T11:32:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-3639"], "description": "Ken Johnson and Jann Horn independently discovered that microprocessors \nutilizing speculative execution of a memory read may allow unauthorized \nmemory reads via sidechannel attacks. An attacker in the guest could use \nthis to expose sensitive guest information, including kernel memory. This \nupdate allows QEMU to expose new CPU features added by AMD microcode \nupdates to guests on amd64 and i386.", "edition": 6, "modified": "2018-06-12T00:00:00", "published": "2018-06-12T00:00:00", "id": "USN-3679-1", "href": "https://ubuntu.com/security/notices/USN-3679-1", "title": "QEMU update", "type": "ubuntu", "cvss": {"score": 4.9, "vector": "AV:L/AC:L/Au:N/C:C/I:N/A:N"}}]}