{"id":"CVE-2018-5407","details":"Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.","modified":"2026-05-17T12:02:56.553005860Z","published":"2018-11-15T21:29:00.233Z","related":["SUSE-FU-2022:0445-1","SUSE-SU-2018:3864-1","SUSE-SU-2018:3864-2","SUSE-SU-2018:3866-1","SUSE-SU-2018:3964-1","SUSE-SU-2018:3989-1","SUSE-SU-2018:4001-1","SUSE-SU-2018:4068-1","SUSE-SU-2018:4274-1","SUSE-SU-2019:0117-1","SUSE-SU-2019:0395-1","SUSE-SU-2019:1553-1","openSUSE-SU-2024:11126-1"],"database_specific":{"unresolved_ranges":[{"cpes":["cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"14.04"},{"last_affected":"16.04"},{"last_affected":"18.04"},{"last_affected":"18.10"}],"vendor_product":"canonical:ubuntu_linux"},{"vendor_product":"debian:debian_linux","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.0"},{"last_affected":"9.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:api_gateway","extracted_events":[{"last_affected":"11.1.2.4.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:api_gateway:11.1.2.4.0:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:application_server","extracted_events":[{"last_affected":"0.9.8"},{"last_affected":"1.0.0"},{"last_affected":"1.0.1"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:application_server:0.9.8:*:*:*:*:*:*:*","cpe:2.3:a:oracle:application_server:1.0.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:application_server:1.0.1:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:enterprise_manager_base_platform","extracted_events":[{"last_affected":"12.1.0.5.0"},{"last_affected":"13.2.0.0.0"},{"last_affected":"13.3.0.0.0"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:enterprise_manager_base_platform:12.1.0.5.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.0.0.0:*:*:*:*:*:*:*","cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3.0.0.0:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:enterprise_manager_ops_center","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.3.3"}],"cpes":["cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:a:oracle:mysql_enterprise_backup:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"3.12.3"},{"introduced":"3.12.4"},{"last_affected":"4.1.2"}],"vendor_product":"oracle:mysql_enterprise_backup"},{"vendor_product":"oracle:peoplesoft_enterprise_peopletools","source":"CPE_FIELD","extracted_events":[{"last_affected":"8.55"},{"last_affected":"8.56"},{"last_affected":"8.57"}],"cpes":["cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*","cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*","cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:primavera_p6_enterprise_project_portfolio_management","extracted_events":[{"introduced":"17.7"},{"last_affected":"17.12"},{"last_affected":"8.4"},{"last_affected":"15.1"},{"last_affected":"15.2"},{"last_affected":"16.1"},{"last_affected":"16.2"},{"last_affected":"18.8"}],"source":"CPE_FIELD","cpes":["cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:*:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.1:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:15.2:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.1:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:16.2:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:18.8:*:*:*:*:*:*:*","cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:8.4:*:*:*:*:*:*:*"]},{"vendor_product":"oracle:tuxedo","source":"CPE_FIELD","extracted_events":[{"last_affected":"12.1.1.0.0"}],"cpes":["cpe:2.3:a:oracle:tuxedo:12.1.1.0.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"fixed":"6.0.0"}],"vendor_product":"oracle:vm_virtualbox"},{"vendor_product":"redhat:enterprise_linux_desktop","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"]},{"cpes":["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*","cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"},{"last_affected":"7.6"}],"vendor_product":"redhat:enterprise_linux_server"},{"vendor_product":"redhat:enterprise_linux_server_aus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_eus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_server_tus","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.6"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*"]},{"vendor_product":"redhat:enterprise_linux_workstation","source":"CPE_FIELD","extracted_events":[{"last_affected":"7.0"}],"cpes":["cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"]},{"vendor_product":"tenable:nessus","source":"CPE_FIELD","extracted_events":[{"fixed":"8.1.1"}],"cpes":["cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*"]}]},"references":[{"type":"WEB","url":"https://support.f5.com/csp/article/K49711130?utm_source=f5support&amp%3Butm_medium=RSS"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/105897"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0483"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0651"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0652"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:2125"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3929"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3931"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3932"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3933"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:3935"},{"type":"ADVISORY","url":"https://eprint.iacr.org/2018/1060.pdf"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2018/11/msg00024.html"},{"type":"ADVISORY","url":"https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201903-10"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20181126-0001/"},{"type":"ADVISORY","url":"https://usn.ubuntu.com/3840-1/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4348"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4355"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-16"},{"type":"ADVISORY","url":"https://www.tenable.com/security/tns-2018-17"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuapr2020.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2020.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html"},{"type":"FIX","url":"https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"},{"type":"EVIDENCE","url":"https://github.com/bbbrumley/portsmash"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/45785/"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}