Описание
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 4.15.11-1 | package | |
nvidia-graphics-drivers | fixed | 384.111-1 | package | |
nvidia-graphics-drivers | fixed | 384.111-4~deb9u1 | stretch | package |
nvidia-graphics-drivers | fixed | 340.106-1 | jessie | package |
nvidia-graphics-drivers | end-of-life | wheezy | package | |
nvidia-graphics-drivers-legacy-340xx | fixed | 340.106-1 | package | |
nvidia-graphics-drivers-legacy-340xx | fixed | 340.106-1~deb9u1 | stretch | package |
nvidia-graphics-drivers-legacy-304xx | unfixed | package | ||
nvidia-graphics-drivers-legacy-304xx | no-dsa | stretch | package | |
nvidia-graphics-drivers-legacy-304xx | no-dsa | jessie | package | |
linux-grsec | removed | package |
Примечания
https://spectreattack.com/
https://xenbits.xen.org/xsa/advisory-254.html
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
Paper: https://spectreattack.com/spectre.pdf
https://01.org/security/advisories/intel-oss-10002
EPSS
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
EPSS