Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5715

Опубликовано: 04 янв. 2018
Источник: debian
EPSS Критический

Описание

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.15.11-1package
intel-microcodefixed3.20180425.1package
intel-microcodefixed3.20180425.1~deb9u1stretchpackage
intel-microcodefixed3.20180425.1~deb8u1jessiepackage
amd64-microcodefixed3.20180515.1package
qemufixed1:2.12~rc3+dfsg-1package
qemu-kvmremovedpackage
virtualboxfixed5.2.6-dfsg-1package
virtualboxend-of-lifejessiepackage
virtualboxend-of-lifewheezypackage
nvidia-graphics-driversfixed384.111-1package
nvidia-graphics-driversfixed384.111-4~deb9u1stretchpackage
nvidia-graphics-driversfixed340.106-1jessiepackage
nvidia-graphics-driversend-of-lifewheezypackage
nvidia-graphics-drivers-legacy-340xxfixed340.106-1package
nvidia-graphics-drivers-legacy-340xxfixed340.106-1~deb9u1stretchpackage
nvidia-graphics-drivers-legacy-304xxunfixedpackage
nvidia-graphics-drivers-legacy-304xxno-dsastretchpackage
nvidia-graphics-drivers-legacy-304xxno-dsajessiepackage
linux-grsecremovedpackage
xenfixed4.11.1~pre+1.733450b39b-1package
xenignoredjessiepackage

Примечания

  • https://spectreattack.com/

  • https://xenbits.xen.org/xsa/advisory-254.html

  • https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html

  • Paper: https://spectreattack.com/spectre.pdf

  • https://www.suse.com/de-de/support/kb/doc/?id=7022512

  • https://www.suse.com/support/update/announcement/2018/suse-su-20180009-1/

  • For the required microcode updates in advance:

  • intel-microcode: https://bugs.debian.org/886367

  • intel-microcode: Some microcode updates to partially adress CVE-2017-5715 included in 3.20171215.1

  • Further updates in 3.20180312.1

  • amd64-microcode: https://bugs.debian.org/886382

  • amd64-microcode updates in 3.20180515.1

  • Qemu patches: https://lists.nongnu.org/archive/html/qemu-devel/2018-01/msg00811.html

  • to pass thorugh new MSR and CPUID flags from the host VM to the CPU, to

  • allow (future) enabling/disabling ranch prediction features in the Intel

  • CPU.

EPSS

Процентиль: 100%
0.91049
Критический

Связанные уязвимости

CVSS3: 5.6
ubuntu
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
redhat
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

CVSS3: 5.6
nvd
больше 7 лет назад

Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.

suse-cvrf
почти 7 лет назад

Security update for kernel-firmware

suse-cvrf
около 7 лет назад

Security update for kernel-firmware

EPSS

Процентиль: 100%
0.91049
Критический