BDU:2019-00768
Vulnerability from fstec - Published: 03.05.2018
VLAI Severity ?
Title
Уязвимость процессоров Intel и ARM, связанная с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память, позволяющая нарушителю раскрыть защищаемую информацию
Description
Уязвимость процессоров Intel и ARM связана с использованием спекулятивного выполнения и чтения из памяти до возврата адресов предыдущих операций записи в память. Эксплуатация уязвимости может позволить нарушителю раскрыть защищаемую информацию с помощью специально сформированного приложения
Severity ?
Vendor
Red Hat Inc., Сообщество свободного программного обеспечения, Oracle Corp., ООО «РусБИТех-Астра», АО «ИВК», Novell Inc., ARM Limited, Juniper Networks Inc., Siemens AG, Intel Corp., Advanced Micro Devices Inc., Beckhoff Automation GmbH & Co. KG
Software Name
Red Hat Enterprise Linux, Debian GNU/Linux, Solaris, Astra Linux Special Edition (запись в едином реестре российских программ №369), Альт Линукс СПТ (запись в едином реестре российских программ №9), OpenSUSE Leap, ARM Cortex-A75, ARM Cortex-A57, ARM Cortex-A72, ARM Cortex-A73, Junos Space Network Management Platform, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC1900 PRO, SIMATIC ITC2200, SIMATIC ITC2200 PRO, Intel Core, ARM Cortex-A76, Intel Xeon, Intel Pentium, Intel Atom, Intel Celeron, AMD, SIMATIC Field PG M5, SIMATIC IPC427E, SIMATIC IPC477E, SIMATIC IPC547E, SIMATIC IPC547G, SIMATIC IPC627D, SIMATIC IPC647D, SIMATIC IPC677D, SIMATIC IPC847D, SIMATIC ITP1000, SIMATIC ET 200SP Open Controller, SIMATIC IPC427C, SIMATIC IPC477C, SINEMA Remote Connect, RUGGEDCOM APE, SIMATIC Field PG M4, SIMATIC IPC427D, SIMATIC IPC477D, SIMATIC IPC477E Pro, SIMATIC IPC627C, SIMATIC IPC647C, SIMATIC IPC677C, SIMATIC IPC827C, SIMATIC IPC847C, SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SIMOTION P320-4E, SIMOTION P320-4S, SINUMERIK 840D sl, SINUMERIK PCU 50.5, SINUMERIK Panels с интегрированной TCU, SINUMERIK TCU 30.3, SIMATIC ET 200 SP Open Controller (F), SIMATIC HMI Basic Panels 2nd Generation, SIMATIC HMI Comfort 15-22 Panels, SIMATIC HMI Comfort 4-12" Panels, SIMATIC HMI Comfort PRO Panels, SIMATIC HMI KTP Mobile Panels, SIMATIC IPC3000 SMART V2, SIMATIC IPC347E, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 Software Controller, Beckhoff ATX Industrial Motherboard, Beckhoff Embedded PC, Beckhoff Basic CPU, Red Hat Virtualization, Red Hat Enterprise MRG, Альт 8 СП Рабочая станция, Red Hat OpenStack Platform, SIMATIC WinAC RTX 2010 incl. F, Red Hat Virtualization Engine, RHEV Manager, Intel Management Engine, Linux
Software Version
6 (Red Hat Enterprise Linux), 7 (Debian GNU/Linux), 11 (Solaris), 7 (Red Hat Enterprise Linux), 6.4 Advanced Update Support (Red Hat Enterprise Linux), 6.5 Advanced Update Support (Red Hat Enterprise Linux), 6.6 Advanced Update Support (Red Hat Enterprise Linux), 1.5 «Смоленск» (Astra Linux Special Edition), 7.0 (Альт Линукс СПТ), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), - (ARM Cortex-A75), - (ARM Cortex-A57), - (ARM Cortex-A72), - (ARM Cortex-A73), 1.6 «Смоленск» (Astra Linux Special Edition), до 18.3R1 включительно (Junos Space Network Management Platform), до 3.1 (SIMATIC ITC1500), до 3.1 (SIMATIC ITC1500 PRO), до 3.1 (SIMATIC ITC1900), до 3.1 (SIMATIC ITC1900 PRO), до 3.1 (SIMATIC ITC2200), до 3.1 (SIMATIC ITC2200 PRO), 2nd generation (Intel Core), 3rd generation (Intel Core), 4th generation (Intel Core), 5th generation (Intel Core), 6th generation (Intel Core), 7th generation (Intel Core), 8th generation (Intel Core), i3 (Intel Core), i5 (Intel Core), i7 (Intel Core), M (Intel Core), X-series (Intel Core), - (ARM Cortex-A76), 3400 series (Intel Xeon), 3500 series (Intel Xeon), 3600 series (Intel Xeon), 5500 series (Intel Xeon), 5600 series (Intel Xeon), 6500 series (Intel Xeon), 7500 series (Intel Xeon), E3 Family (Intel Xeon), E3 v2 Family (Intel Xeon), E3 v3 Family (Intel Xeon), E3 v4 Family (Intel Xeon), E3 v5 Family (Intel Xeon), E3 v6 Family (Intel Xeon), E5 Family (Intel Xeon), E5 v2 Family (Intel Xeon), E5 v3 Family (Intel Xeon), E5 v4 Family (Intel Xeon), E5 v5 Family (Intel Xeon), E5 v6 Family (Intel Xeon), E7 Family (Intel Xeon), E7 v2 Family (Intel Xeon), E7 v3 Family (Intel Xeon), E7 v4 Family (Intel Xeon), Scalable Family (Intel Xeon), J4205 (Intel Pentium), J5005 (Intel Pentium), N4000 (Intel Pentium), N4100 (Intel Pentium), N4200 (Intel Pentium), N5000 (Intel Pentium), C3308 (Intel Atom), C3338 (Intel Atom), C3508 (Intel Atom), C3538 (Intel Atom), C3558 (Intel Atom), C3708 (Intel Atom), C3750 (Intel Atom), C3758 (Intel Atom), C3808 (Intel Atom), C3830 (Intel Atom), C3850 (Intel Atom), C3858 (Intel Atom), C3950 (Intel Atom), C3955 (Intel Atom), C3958 (Intel Atom), E Series (Intel Atom), A Series (Intel Atom), x5-E3930 (Intel Atom), x5-E3940 (Intel Atom), x7-E3950 (Intel Atom), T5500 (Intel Atom), T5700 (Intel Atom), Z Series (Intel Atom), J3355 (Intel Celeron), J3455 (Intel Celeron), J4005 (Intel Celeron), J4105 (Intel Celeron), N3450 (Intel Celeron), Family 15h (AMD), Family 16h (AMD), Family 17h (AMD), до 22.01.06 (SIMATIC Field PG M5), до 21.01.09 (SIMATIC IPC427E), до 21.01.09 (SIMATIC IPC477E), до R1.30.0 (SIMATIC IPC547E), до R1.23.0 (SIMATIC IPC547G), до 19.02.11 (SIMATIC IPC627D), до 19.01.14 (SIMATIC IPC647D), до 19.02.11 (SIMATIC IPC677D), до 19.01.14 (SIMATIC IPC847D), до 23.01.04 (SIMATIC ITP1000), до 2.6 (SIMATIC ET 200SP Open Controller), - (SIMATIC IPC427C), - (SIMATIC IPC477C), - (SINEMA Remote Connect), - (RUGGEDCOM APE), до 18.01.09 (SIMATIC Field PG M4), до 17.0X.14 (SIMATIC IPC427D), до 17.0X.14 (SIMATIC IPC477D), до 21.01.09 (SIMATIC IPC477E Pro), до 15.02.15 (SIMATIC IPC627C), до 15.01.14 (SIMATIC IPC647C), до 15.02.15 (SIMATIC IPC677C), до 15.02.15 (SIMATIC IPC827C), до 15.01.14 (SIMATIC IPC847C), до 2.6 (SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP), до 2.6 (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), до 17.0X.14 (SIMOTION P320-4E), до 17.0X.14 (SIMOTION P320-4S), - (SINUMERIK 840D sl), до 15.02.15 (SINUMERIK PCU 50.5), Выпущенные до 2016 включительно (SINUMERIK Panels с интегрированной TCU), - (SINUMERIK TCU 30.3), до 2.6 (SIMATIC ET 200 SP Open Controller (F)), - (SIMATIC HMI Basic Panels 2nd Generation), - (SIMATIC HMI Comfort 15-22 Panels), - (SIMATIC HMI Comfort 4-12" Panels), SIMATIC HMI Comfort PRO Panels (SIMATIC HMI Comfort PRO Panels), - (SIMATIC HMI Comfort PRO Panels), - (SIMATIC HMI KTP Mobile Panels), до 1.5 (SIMATIC IPC3000 SMART V2), до 1.5 (SIMATIC IPC347E), до 2.6 (SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK), до 2.6 (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK), до 2.6 (SIMATIC S7-1500 Software Controller), CBxx56 (Beckhoff ATX Industrial Motherboard), CBxx55 (Beckhoff ATX Industrial Motherboard), CBxx63 (Beckhoff ATX Industrial Motherboard), CBxx61 (Beckhoff ATX Industrial Motherboard), CBxx60 (Beckhoff ATX Industrial Motherboard), CBxx64 (Beckhoff ATX Industrial Motherboard), CX51x0 (Beckhoff Embedded PC), CX20x0 (Beckhoff Basic CPU), 4 (Red Hat Virtualization), 2.0 (Red Hat Enterprise MRG), - (Альт 8 СП Рабочая станция), 15.0 (OpenSUSE Leap), 8 (Debian GNU/Linux), 9.0 (Red Hat OpenStack Platform), 10 (Debian GNU/Linux), 7.4 Extended Update Support (Red Hat Enterprise Linux), 10 (Red Hat OpenStack Platform), до SP3 (SIMATIC WinAC RTX 2010 incl. F), 7.2 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Telco Extended Update Support (Red Hat Enterprise Linux), 5 Extended Lifecycle Support (Red Hat Enterprise Linux), 5.9 Long Life (Red Hat Enterprise Linux), 7.3 Extended Update Support (Red Hat Enterprise Linux), 6.6 Telco Extended Update Support (Red Hat Enterprise Linux), 7.2 Update Services for SAP Solutions (Red Hat Enterprise Linux), 6.7 Extended Update Support (Red Hat Enterprise Linux), 3 (Red Hat Virtualization), 7.0 (Kilo) (Red Hat OpenStack Platform), 8.0 (Liberty) (Red Hat OpenStack Platform), 12.0 (Pike) (Red Hat OpenStack Platform), 4.3 (Red Hat Virtualization Engine), 4.2 (Red Hat Virtualization Engine), 3.6 (RHEV Manager), 13 (Red Hat OpenStack Platform), до 1.5 (Intel Management Engine), до 15.01.14 (Intel Management Engine), до 15.02.15 (Intel Management Engine), до 17.0x.14 (Intel Management Engine), до 18.01.09 (Intel Management Engine), до 19.01.14 (Intel Management Engine), до 19.02.11 (Intel Management Engine), до 2.6 (Intel Management Engine), до 21.01.09 (Intel Management Engine), до 22.01.06 (Intel Management Engine), до 23.01.04 (Intel Management Engine), до 3.1 (Intel Management Engine), до 7.6.0 (Intel Management Engine), до r1.23.0 (Intel Management Engine), до r1.30.0 (Intel Management Engine), от 4.0 до 4.4.167 включительно (Linux), от 4.5 до 4.9.143 включительно (Linux), от 4.10 до 4.14.85 включительно (Linux), от 4.15 до 4.16.10 включительно (Linux)
Possible Mitigations
Использование рекомендаций:
Для Linux:
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.86
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.168
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.144
Обновление программного обеспечения до V3.1:
https://support.industry.siemens.com/cs/ww/en/view/109761864
Для SIMATIC Field PG M4 до версии BIOS V18.01.09:
https://support.industry.siemens.com/cs/de/en/view/109037537
Для SIMATIC Field PG M5 до версии BIOS V22.01.06:
https://support.industry.siemens.com/cs/de/en/view/109738122
Для SIMATIC ET 200 SP Open Controller и SIMATIC ET 200 SP Open Controller (F) до V2.6:
https://support.industry.siemens.com/cs/ww/en/view/109759122
Для SIMATIC HMI Basic Panels 2nd Generation до V15.1:
https://support.industry.siemens.com/cs/ww/en/view/109761203
Для SIMATIC HMI Comfort 15-22 Panels, SIMATIC HMI Comfort 4-12" Panels, SIMATIC HMI Comfort PRO Panels и SIMATIC HMI KTP Mobile Panels до V15 Upd 2:
https://support.industry.siemens.com/cs/ww/en/view/109755826
Для SIMATIC IPC3000 SMART V2 и SIMATIC IPC347E до версии BIOS V1.5:
https://support.industry.siemens.com/cs/ww/en/view/109759824
Для SIMATIC IPC427D, SIMATIC IPC477D, SIMOTION P320-4E и SIMOTION P320-4S до версии BIOS V17.0X.14:
https://support.industry.siemens.com/cs/de/en/view/108608500
Для SIMATIC IPC427E, SIMATIC IPC477E и SIMATIC IPC477E Pro до версии BIOS V21.01.09:
https://support.industry.siemens.com/cs/de/en/view/109742593
Для SIMATIC IPC547E до версии BIOS R1.30.0:
https://support.industry.siemens.com/cs/us/en/view/109481624
Для SIMATIC IPC547G до версии BIOS R1.23.0:
https://support.industry.siemens.com/cs/us/en/view/109750349
Для SIMATIC IPC627D, SIMATIC IPC677D и SIMATIC IPC827D до версии BIOS V19.02.11: https://support.industry.siemens.com/cs/ww/de/view/109474954
Для SIMATIC IPC627C, SIMATIC IPC677C и SIMATIC IPC827C до версии BIOS V15.02.15:
https://support.industry.siemens.com/cs/ww/en/view/48792087
Для SIMATIC IPC647C и SIMATIC IPC847C до версии BIOS V15.01.14:
https://support.industry.siemens.com/cs/ww/en/view/48792076
Для SIMATIC IPC647D и SIMATIC IPC847D до версии BIOS V19.01.14:
https://support.industry.siemens.com/cs/ww/en/view/109037779
Для SIMATIC ITP1000 до версии BIOS V23.01.04:
https://support.industry.siemens.com/cs/us/en/view/109748173
Для SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK и SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP до версии BIOS V2.6:
https://support.industry.siemens.com/cs/ww/en/view/109478459
Компенсирующие меры:
Для RUGGEDCOM APE и RUGGEDCOM RX1400 VPE:
Применение исправлений Debian по мере их появления
Ограничение возможностей запуска ненадежного кода, если это возможно
Применение концепции углубленной защиты
https://www.siemens.com/industrialsecurity
Для ОС ОН «Стрелец»:
Обновление программного обеспечения libvirt до версии 3.0.0-4+deb9u5
Для ОС Astra Linux 1.5 https://wiki.astralinux.ru/pages/viewpage.action?pageId=1212483
Для ОС Astra Linux 1.6 https://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734
Reference
http://www.securitytracker.com/id/1040949
http://xenbits.xen.org/xsa/advisory-263.html
https://access.redhat.com/security/vulnerabilities/ssbd
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf
https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639
https://developer.amd.com/wp-content/resources/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
https://exchange.xforce.ibmcloud.com/vulnerabilities/143569
https://exploit-db.com/exploits/44695
https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10917&cat=SIRT_1&actp=LIST
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.86
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.168
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.144
https://nvd.nist.gov/vuln/detail/CVE-2018-3639
https://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf
https://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf
https://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023
https://ubuntu.com/security/notices/USN-3651-1
https://ubuntu.com/security/notices/USN-3652-1
https://ubuntu.com/security/notices/USN-3653-1
https://ubuntu.com/security/notices/USN-3653-2
https://ubuntu.com/security/notices/USN-3654-1
https://ubuntu.com/security/notices/USN-3654-2
https://ubuntu.com/security/notices/USN-3655-1
https://ubuntu.com/security/notices/USN-3655-2
https://ubuntu.com/security/notices/USN-3679-1
https://ubuntu.com/security/notices/USN-3680-1
https://ubuntu.com/security/notices/USN-3756-1
https://ubuntu.com/security/notices/USN-3777-3
https://usn.ubuntu.com/usn/usn-3651-1
https://usn.ubuntu.com/usn/usn-3652-1
https://usn.ubuntu.com/usn/usn-3653-1
https://usn.ubuntu.com/usn/usn-3653-2
https://usn.ubuntu.com/usn/usn-3654-1
https://usn.ubuntu.com/usn/usn-3654-2
https://usn.ubuntu.com/usn/usn-3655-1
https://usn.ubuntu.com/usn/usn-3655-2
https://usn.ubuntu.com/usn/usn-3679-1
https://usn.ubuntu.com/usn/usn-3680-1
https://usn.ubuntu.com/usn/usn-3756-1
https://usn.ubuntu.com/usn/usn-3777-3
https://www.cve.org/CVERecord?id=CVE-2018-3639
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works
https://www.securitylab.ru/news/493910.php
https://xenbits.xen.org/xsa/advisory-263.html
https://wiki.astralinux.ru/pages/viewpage.action?pageId=1212483
https://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734
CWE
CWE-200, CWE-203
{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:N/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Oracle Corp., \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Novell Inc., ARM Limited, Juniper Networks Inc., Siemens AG, Intel Corp., Advanced Micro Devices Inc., Beckhoff Automation GmbH \u0026 Co. KG",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Debian GNU/Linux), 11 (Solaris), 7 (Red Hat Enterprise Linux), 6.4 Advanced Update Support (Red Hat Enterprise Linux), 6.5 Advanced Update Support (Red Hat Enterprise Linux), 6.6 Advanced Update Support (Red Hat Enterprise Linux), 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 7.0 (\u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422), 9 (Debian GNU/Linux), 42.3 (OpenSUSE Leap), - (ARM Cortex-A75), - (ARM Cortex-A57), - (ARM Cortex-A72), - (ARM Cortex-A73), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), \u0434\u043e 18.3R1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Junos Space Network Management Platform), \u0434\u043e 3.1 (SIMATIC ITC1500), \u0434\u043e 3.1 (SIMATIC ITC1500 PRO), \u0434\u043e 3.1 (SIMATIC ITC1900), \u0434\u043e 3.1 (SIMATIC ITC1900 PRO), \u0434\u043e 3.1 (SIMATIC ITC2200), \u0434\u043e 3.1 (SIMATIC ITC2200 PRO), 2nd generation (Intel Core), 3rd generation (Intel Core), 4th generation (Intel Core), 5th generation (Intel Core), 6th generation (Intel Core), 7th generation (Intel Core), 8th generation (Intel Core), i3 (Intel Core), i5 (Intel Core), i7 (Intel Core), M (Intel Core), X-series (Intel Core), - (ARM Cortex-A76), 3400 series (Intel Xeon), 3500 series (Intel Xeon), 3600 series (Intel Xeon), 5500 series (Intel Xeon), 5600 series (Intel Xeon), 6500 series (Intel Xeon), 7500 series (Intel Xeon), E3 Family (Intel Xeon), E3 v2 Family (Intel Xeon), E3 v3 Family (Intel Xeon), E3 v4 Family (Intel Xeon), E3 v5 Family (Intel Xeon), E3 v6 Family (Intel Xeon), E5 Family (Intel Xeon), E5 v2 Family (Intel Xeon), E5 v3 Family (Intel Xeon), E5 v4 Family (Intel Xeon), E5 v5 Family (Intel Xeon), E5 v6 Family (Intel Xeon), E7 Family (Intel Xeon), E7 v2 Family (Intel Xeon), E7 v3 Family (Intel Xeon), E7 v4 Family (Intel Xeon), Scalable Family (Intel Xeon), J4205 (Intel Pentium), J5005 (Intel Pentium), N4000 (Intel Pentium), N4100 (Intel Pentium), N4200 (Intel Pentium), N5000 (Intel Pentium), C3308 (Intel Atom), C3338 (Intel Atom), C3508 (Intel Atom), C3538 (Intel Atom), C3558 (Intel Atom), C3708 (Intel Atom), C3750 (Intel Atom), C3758 (Intel Atom), C3808 (Intel Atom), C3830 (Intel Atom), C3850 (Intel Atom), C3858 (Intel Atom), C3950 (Intel Atom), C3955 (Intel Atom), C3958 (Intel Atom), E Series (Intel Atom), A Series (Intel Atom), x5-E3930 (Intel Atom), x5-E3940 (Intel Atom), x7-E3950 (Intel Atom), T5500 (Intel Atom), T5700 (Intel Atom), Z Series (Intel Atom), J3355 (Intel Celeron), J3455 (Intel Celeron), J4005 (Intel Celeron), J4105 (Intel Celeron), N3450 (Intel Celeron), Family 15h (AMD), Family 16h (AMD), Family 17h (AMD), \u0434\u043e 22.01.06 (SIMATIC Field PG M5), \u0434\u043e 21.01.09 (SIMATIC IPC427E), \u0434\u043e 21.01.09 (SIMATIC IPC477E), \u0434\u043e R1.30.0 (SIMATIC IPC547E), \u0434\u043e R1.23.0 (SIMATIC IPC547G), \u0434\u043e 19.02.11 (SIMATIC IPC627D), \u0434\u043e 19.01.14 (SIMATIC IPC647D), \u0434\u043e 19.02.11 (SIMATIC IPC677D), \u0434\u043e 19.01.14 (SIMATIC IPC847D), \u0434\u043e 23.01.04 (SIMATIC ITP1000), \u0434\u043e 2.6 (SIMATIC ET 200SP Open Controller), - (SIMATIC IPC427C), - (SIMATIC IPC477C), - (SINEMA Remote Connect), - (RUGGEDCOM APE), \u0434\u043e 18.01.09 (SIMATIC Field PG M4), \u0434\u043e 17.0X.14 (SIMATIC IPC427D), \u0434\u043e 17.0X.14 (SIMATIC IPC477D), \u0434\u043e 21.01.09 (SIMATIC IPC477E Pro), \u0434\u043e 15.02.15 (SIMATIC IPC627C), \u0434\u043e 15.01.14 (SIMATIC IPC647C), \u0434\u043e 15.02.15 (SIMATIC IPC677C), \u0434\u043e 15.02.15 (SIMATIC IPC827C), \u0434\u043e 15.01.14 (SIMATIC IPC847C), \u0434\u043e 2.6 (SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP), \u0434\u043e 2.6 (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP), \u0434\u043e 17.0X.14 (SIMOTION P320-4E), \u0434\u043e 17.0X.14 (SIMOTION P320-4S), - (SINUMERIK 840D sl), \u0434\u043e 15.02.15 (SINUMERIK PCU 50.5), \u0412\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0435 \u0434\u043e 2016 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (SINUMERIK Panels \u0441 \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 TCU), - (SINUMERIK TCU 30.3), \u0434\u043e 2.6 (SIMATIC ET 200 SP Open Controller (F)), - (SIMATIC HMI Basic Panels 2nd Generation), - (SIMATIC HMI Comfort 15-22 Panels), - (SIMATIC HMI Comfort 4-12\" Panels), SIMATIC HMI Comfort PRO Panels (SIMATIC HMI Comfort PRO Panels), - (SIMATIC HMI Comfort PRO Panels), - (SIMATIC HMI KTP Mobile Panels), \u0434\u043e 1.5 (SIMATIC IPC3000 SMART V2), \u0434\u043e 1.5 (SIMATIC IPC347E), \u0434\u043e 2.6 (SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK), \u0434\u043e 2.6 (SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK), \u0434\u043e 2.6 (SIMATIC S7-1500 Software Controller), CBxx56 (Beckhoff ATX Industrial Motherboard), CBxx55 (Beckhoff ATX Industrial Motherboard), CBxx63 (Beckhoff ATX Industrial Motherboard), CBxx61 (Beckhoff ATX Industrial Motherboard), CBxx60 (Beckhoff ATX Industrial Motherboard), CBxx64 (Beckhoff ATX Industrial Motherboard), CX51x0 (Beckhoff Embedded PC), CX20x0 (Beckhoff Basic CPU), 4 (Red Hat Virtualization), 2.0 (Red Hat Enterprise MRG), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f), 15.0 (OpenSUSE Leap), 8 (Debian GNU/Linux), 9.0 (Red Hat OpenStack Platform), 10 (Debian GNU/Linux), 7.4 Extended Update Support (Red Hat Enterprise Linux), 10 (Red Hat OpenStack Platform), \u0434\u043e SP3 (SIMATIC WinAC RTX 2010 incl. F), 7.2 Advanced Update Support (Red Hat Enterprise Linux), 7.2 Telco Extended Update Support (Red Hat Enterprise Linux), 5 Extended Lifecycle Support (Red Hat Enterprise Linux), 5.9 Long Life (Red Hat Enterprise Linux), 7.3 Extended Update Support (Red Hat Enterprise Linux), 6.6 Telco Extended Update Support (Red Hat Enterprise Linux), 7.2 Update Services for SAP Solutions (Red Hat Enterprise Linux), 6.7 Extended Update Support (Red Hat Enterprise Linux), 3 (Red Hat Virtualization), 7.0 (Kilo) (Red Hat OpenStack Platform), 8.0 (Liberty) (Red Hat OpenStack Platform), 12.0 (Pike) (Red Hat OpenStack Platform), 4.3 (Red Hat Virtualization Engine), 4.2 (Red Hat Virtualization Engine), 3.6 (RHEV Manager), 13 (Red Hat OpenStack Platform), \u0434\u043e 1.5 (Intel Management Engine), \u0434\u043e 15.01.14 (Intel Management Engine), \u0434\u043e 15.02.15 (Intel Management Engine), \u0434\u043e 17.0x.14 (Intel Management Engine), \u0434\u043e 18.01.09 (Intel Management Engine), \u0434\u043e 19.01.14 (Intel Management Engine), \u0434\u043e 19.02.11 (Intel Management Engine), \u0434\u043e 2.6 (Intel Management Engine), \u0434\u043e 21.01.09 (Intel Management Engine), \u0434\u043e 22.01.06 (Intel Management Engine), \u0434\u043e 23.01.04 (Intel Management Engine), \u0434\u043e 3.1 (Intel Management Engine), \u0434\u043e 7.6.0 (Intel Management Engine), \u0434\u043e r1.23.0 (Intel Management Engine), \u0434\u043e r1.30.0 (Intel Management Engine), \u043e\u0442 4.0 \u0434\u043e 4.4.167 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.5 \u0434\u043e 4.9.143 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.10 \u0434\u043e 4.14.85 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux), \u043e\u0442 4.15 \u0434\u043e 4.16.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Linux:\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.86\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.168\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.144\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e V3.1:\nhttps://support.industry.siemens.com/cs/ww/en/view/109761864\n\n\u0414\u043b\u044f SIMATIC Field PG M4 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V18.01.09:\nhttps://support.industry.siemens.com/cs/de/en/view/109037537\n\n\u0414\u043b\u044f SIMATIC Field PG M5 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V22.01.06:\nhttps://support.industry.siemens.com/cs/de/en/view/109738122\n\n\u0414\u043b\u044f SIMATIC ET 200 SP Open Controller \u0438 SIMATIC ET 200 SP Open Controller (F) \u0434\u043e V2.6:\nhttps://support.industry.siemens.com/cs/ww/en/view/109759122\n\n\u0414\u043b\u044f SIMATIC HMI Basic Panels 2nd Generation \u0434\u043e V15.1:\nhttps://support.industry.siemens.com/cs/ww/en/view/109761203\n\n\u0414\u043b\u044f SIMATIC HMI Comfort 15-22 Panels, SIMATIC HMI Comfort 4-12\" Panels, SIMATIC HMI Comfort PRO Panels \u0438 SIMATIC HMI KTP Mobile Panels \u0434\u043e V15 Upd 2:\nhttps://support.industry.siemens.com/cs/ww/en/view/109755826\n\n\u0414\u043b\u044f SIMATIC IPC3000 SMART V2 \u0438 SIMATIC IPC347E \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V1.5:\nhttps://support.industry.siemens.com/cs/ww/en/view/109759824\n\n\u0414\u043b\u044f SIMATIC IPC427D, SIMATIC IPC477D, SIMOTION P320-4E \u0438 SIMOTION P320-4S \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V17.0X.14:\nhttps://support.industry.siemens.com/cs/de/en/view/108608500\n\n\u0414\u043b\u044f SIMATIC IPC427E, SIMATIC IPC477E \u0438 SIMATIC IPC477E Pro \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V21.01.09:\nhttps://support.industry.siemens.com/cs/de/en/view/109742593\n\n\u0414\u043b\u044f SIMATIC IPC547E \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS R1.30.0:\nhttps://support.industry.siemens.com/cs/us/en/view/109481624\n\n\u0414\u043b\u044f SIMATIC IPC547G \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS R1.23.0:\nhttps://support.industry.siemens.com/cs/us/en/view/109750349\n\n\u0414\u043b\u044f SIMATIC IPC627D, SIMATIC IPC677D \u0438 SIMATIC IPC827D \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V19.02.11: https://support.industry.siemens.com/cs/ww/de/view/109474954\n\n\u0414\u043b\u044f SIMATIC IPC627C, SIMATIC IPC677C \u0438 SIMATIC IPC827C \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V15.02.15:\nhttps://support.industry.siemens.com/cs/ww/en/view/48792087\n\n\u0414\u043b\u044f SIMATIC IPC647C \u0438 SIMATIC IPC847C \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V15.01.14:\nhttps://support.industry.siemens.com/cs/ww/en/view/48792076\n\n\u0414\u043b\u044f SIMATIC IPC647D \u0438 SIMATIC IPC847D \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V19.01.14:\nhttps://support.industry.siemens.com/cs/ww/en/view/109037779\n\n\u0414\u043b\u044f SIMATIC ITP1000 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V23.01.04:\nhttps://support.industry.siemens.com/cs/us/en/view/109748173\n\n\u0414\u043b\u044f SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK \u0438 SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 BIOS V2.6:\nhttps://support.industry.siemens.com/cs/ww/en/view/109478459\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n\n\u0414\u043b\u044f RUGGEDCOM APE \u0438 RUGGEDCOM RX1400 VPE:\n\u041f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 Debian \u043f\u043e \u043c\u0435\u0440\u0435 \u0438\u0445 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f\n\n\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0435\u0441\u043b\u0438 \u044d\u0442\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\n\u041f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u043d\u0446\u0435\u043f\u0446\u0438\u0438 \u0443\u0433\u043b\u0443\u0431\u043b\u0435\u043d\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b\nhttps://www.siemens.com/industrialsecurity\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f libvirt \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.0.0-4+deb9u5\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.5 https://wiki.astralinux.ru/pages/viewpage.action?pageId=1212483\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux 1.6 https://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "03.05.2018",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "21.01.2026",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.02.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-00768",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-3639",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Debian GNU/Linux, Solaris, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), OpenSUSE Leap, ARM Cortex-A75, ARM Cortex-A57, ARM Cortex-A72, ARM Cortex-A73, Junos Space Network Management Platform, SIMATIC ITC1500, SIMATIC ITC1500 PRO, SIMATIC ITC1900, SIMATIC ITC1900 PRO, SIMATIC ITC2200, SIMATIC ITC2200 PRO, Intel Core, ARM Cortex-A76, Intel Xeon, Intel Pentium, Intel Atom, Intel Celeron, AMD, SIMATIC Field PG M5, SIMATIC IPC427E, SIMATIC IPC477E, SIMATIC IPC547E, SIMATIC IPC547G, SIMATIC IPC627D, SIMATIC IPC647D, SIMATIC IPC677D, SIMATIC IPC847D, SIMATIC ITP1000, SIMATIC ET 200SP Open Controller, SIMATIC IPC427C, SIMATIC IPC477C, SINEMA Remote Connect, RUGGEDCOM APE, SIMATIC Field PG M4, SIMATIC IPC427D, SIMATIC IPC477D, SIMATIC IPC477E Pro, SIMATIC IPC627C, SIMATIC IPC647C, SIMATIC IPC677C, SIMATIC IPC827C, SIMATIC IPC847C, SIMATIC S7-1500 CPU S7-1518-4 PN/DP MFP, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP MFP, SIMOTION P320-4E, SIMOTION P320-4S, SINUMERIK 840D sl, SINUMERIK PCU 50.5, SINUMERIK Panels \u0441 \u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 TCU, SINUMERIK TCU 30.3, SIMATIC ET 200 SP Open Controller (F), SIMATIC HMI Basic Panels 2nd Generation, SIMATIC HMI Comfort 15-22 Panels, SIMATIC HMI Comfort 4-12\" Panels, SIMATIC HMI Comfort PRO Panels, SIMATIC HMI KTP Mobile Panels, SIMATIC IPC3000 SMART V2, SIMATIC IPC347E, SIMATIC S7-1500 CPU S7-1518-4 PN/DP ODK, SIMATIC S7-1500 CPU S7-1518F-4 PN/DP ODK, SIMATIC S7-1500 Software Controller, Beckhoff ATX Industrial Motherboard, Beckhoff Embedded PC, Beckhoff Basic CPU, Red Hat Virtualization, Red Hat Enterprise MRG, \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f, Red Hat OpenStack Platform, SIMATIC WinAC RTX 2010 incl. F, Red Hat Virtualization Engine, RHEV Manager, Intel Management Engine, Linux",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 6 64-bit, \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 7 System Z, Oracle Corp. Solaris 11 SPARC, Red Hat Inc. Red Hat Enterprise Linux 7 IA-32, Red Hat Inc. Red Hat Enterprise Linux 6.4 Advanced Update Support IA-32, Red Hat Inc. Red Hat Enterprise Linux 6.5 Advanced Update Support IA-32, Red Hat Inc. Red Hat Enterprise Linux 6.6 Advanced Update Support IA-32, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb 64-bit (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.5 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 \u041b\u0438\u043d\u0443\u043a\u0441 \u0421\u041f\u0422 7.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21169), \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Novell Inc. OpenSUSE Leap 42.3 , Oracle Corp. Solaris 11 , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f \u0420\u0430\u0431\u043e\u0447\u0430\u044f \u0441\u0442\u0430\u043d\u0446\u0438\u044f - , Novell Inc. OpenSUSE Leap 15.0 32-bit, Novell Inc. OpenSUSE Leap 15.0 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Red Hat Inc. Red Hat Enterprise Linux 7.4 Extended Update Support , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 7 , Red Hat Inc. Red Hat Enterprise Linux 7.2 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.2 Telco Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 5 Extended Lifecycle Support , Red Hat Inc. Red Hat Enterprise Linux 5.9 Long Life , Red Hat Inc. Red Hat Enterprise Linux 7.3 Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.5 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.6 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.6 Telco Extended Update Support , Red Hat Inc. Red Hat Enterprise Linux 6.4 Advanced Update Support , Red Hat Inc. Red Hat Enterprise Linux 7.2 Update Services for SAP Solutions , Red Hat Inc. Red Hat Enterprise Linux 6.7 Extended Update Support , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.0 \u0434\u043e 4.4.167 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.5 \u0434\u043e 4.9.143 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.10 \u0434\u043e 4.14.85 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Linux \u043e\u0442 4.15 \u0434\u043e 4.16.10 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel \u0438 ARM, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0438 \u0447\u0442\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 \u0434\u043e \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u044c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200), \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0440\u0430\u0441\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u0439 (CWE-203)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel \u0438 ARM \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u043f\u0435\u043a\u0443\u043b\u044f\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0438 \u0447\u0442\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0430\u043c\u044f\u0442\u0438 \u0434\u043e \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u044c. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "http://www.securitytracker.com/id/1040949\nhttp://xenbits.xen.org/xsa/advisory-263.html\nhttps://access.redhat.com/security/vulnerabilities/ssbd\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=1528\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-254686.pdf\nhttps://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf\nhttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-3639\nhttps://developer.amd.com/wp-content/resources/124441_AMD64_SpeculativeStoreBypassDisable_Whitepaper_final.pdf\nhttps://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability\nhttps://exchange.xforce.ibmcloud.com/vulnerabilities/143569\nhttps://exploit-db.com/exploits/44695\nhttps://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10917\u0026cat=SIRT_1\u0026actp=LIST\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.86\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.168\nhttps://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.144\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-3639\nhttps://software.intel.com/sites/default/files/managed/b9/f9/336983-Intel-Analysis-of-Speculative-Execution-Side-Channels-White-Paper.pdf\nhttps://software.intel.com/sites/default/files/managed/c5/63/336996-Speculative-Execution-Side-Channel-Mitigations.pdf\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://ubuntu.com/security/notices/USN-3651-1\nhttps://ubuntu.com/security/notices/USN-3652-1\nhttps://ubuntu.com/security/notices/USN-3653-1\nhttps://ubuntu.com/security/notices/USN-3653-2\nhttps://ubuntu.com/security/notices/USN-3654-1\nhttps://ubuntu.com/security/notices/USN-3654-2\nhttps://ubuntu.com/security/notices/USN-3655-1\nhttps://ubuntu.com/security/notices/USN-3655-2\nhttps://ubuntu.com/security/notices/USN-3679-1\nhttps://ubuntu.com/security/notices/USN-3680-1\nhttps://ubuntu.com/security/notices/USN-3756-1\nhttps://ubuntu.com/security/notices/USN-3777-3\nhttps://usn.ubuntu.com/usn/usn-3651-1\nhttps://usn.ubuntu.com/usn/usn-3652-1\nhttps://usn.ubuntu.com/usn/usn-3653-1\nhttps://usn.ubuntu.com/usn/usn-3653-2\nhttps://usn.ubuntu.com/usn/usn-3654-1\nhttps://usn.ubuntu.com/usn/usn-3654-2\nhttps://usn.ubuntu.com/usn/usn-3655-1\nhttps://usn.ubuntu.com/usn/usn-3655-2\nhttps://usn.ubuntu.com/usn/usn-3679-1\nhttps://usn.ubuntu.com/usn/usn-3680-1\nhttps://usn.ubuntu.com/usn/usn-3756-1\nhttps://usn.ubuntu.com/usn/usn-3777-3\nhttps://www.cve.org/CVERecord?id=CVE-2018-3639\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html\nhttps://www.redhat.com/en/blog/speculative-store-bypass-explained-what-it-how-it-works\nhttps://www.securitylab.ru/news/493910.php\nhttps://xenbits.xen.org/xsa/advisory-263.html\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=1212483\nhttps://wiki.astralinux.ru/pages/viewpage.action?pageId=44892734",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0421\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0410\u0421\u0423 \u0422\u041f, \u041f\u041e \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200, CWE-203",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,5)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…