Systems with microprocessors utilizing speculative execution and Intel software guard extensions (Intel SGX) may allow unauthorized disclosure of information residing in the L1 data cache from an enclave to an attacker with local user access via a side-channel analysis.
[
{
"product": "Multiple",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "Multiple"
}
]
}
]
support.lenovo.com/us/en/solutions/LEN-24163
www.huawei.com/en/psirt/security-advisories/huawei-sa-20180815-01-cpu-en
www.securityfocus.com/bid/105080
www.securitytracker.com/id/1041451
cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf
foreshadowattack.eu/
lists.debian.org/debian-lts-announce/2018/09/msg00017.html
psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0008
security.netapp.com/advisory/ntap-20180815-0001/
software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
support.f5.com/csp/article/K35558453
support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03874en_us
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180814-cpusidechannel
www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
www.kb.cert.org/vuls/id/982149
www.synology.com/support/security/Synology_SA_18_45