CVE-2017-5753

CVE Details

Release Date:2018-01-04

Description


Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

See more information about CVE-2017-5753 from MITRE CVE dictionary and NIST NVD


CVSS v3.0 metrics


NOTE: The following CVSS v3.0 metrics and score provided are preliminary and subject to review.

Base Score: 5.6 Base Metrics: AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Access Vector: Local network Attack Complexity: High
Privileges Required: Low User Interaction: None
Scope: Changed Confidentiality Impact: High
Integrity Impact: None Availability Impact: None

Errata information


PlatformErrataRelease Date
Oracle Linux version 5 (kernel)ELSA-2018-02922018-02-23
Oracle Linux version 5 (kernel-uek)ELSA-2018-40202018-01-24
Oracle Linux version 6 (dtrace-modules-3.8.13-118.20.2.el6uek)ELSA-2018-40222018-01-29
Oracle Linux version 6 (kernel)ELSA-2018-00082018-01-04
Oracle Linux version 6 (kernel-uek)ELSA-2018-40042018-01-05
Oracle Linux version 6 (kernel-uek)ELSA-2018-40202018-01-24
Oracle Linux version 6 (kernel-uek)ELSA-2018-40222018-01-29
Oracle Linux version 7 (dtrace-modules-3.8.13-118.20.2.el7uek)ELSA-2018-40222018-01-29
Oracle Linux version 7 (edk2)ELSA-2019-46682019-06-06
Oracle Linux version 7 (edk2)ELSA-2019-47852019-09-13
Oracle Linux version 7 (kernel)ELSA-2018-00072018-01-04
Oracle Linux version 7 (kernel-uek)ELSA-2018-40042018-01-05
Oracle Linux version 7 (kernel-uek)ELSA-2018-40222018-01-29
Oracle Linux version 7 (qemu)ELSA-2018-42852018-11-20
Oracle Linux version 7 (qemu)ELSA-2018-42892018-11-28
Oracle Linux version 7 (qemu)ELSA-2019-45852019-03-15
Oracle VM version 3.2 (xen)OVMSA-2018-00292018-04-05
Oracle VM version 3.3 (kernel-uek)OVMSA-2018-00162018-01-30
Oracle VM version 3.3 (xen)OVMSA-2018-02242018-05-24
Oracle VM version 3.4 (kernel-uek)OVMSA-2018-00072018-01-08
Oracle VM version 3.4 (xen)OVMSA-2018-00062018-01-08



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete