Описание
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 4.17.15-1 | package | |
xen | fixed | 4.11.1~pre.20180911.5acdd26fdc+dfsg-2 | package | |
xen | ignored | jessie | package | |
intel-microcode | fixed | 3.20180703.1 | package |
Примечания
Updates were already shipped with 20180703 release, but only disclosed later, see #906158
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://foreshadowattack.eu/
https://git.kernel.org/linus/958f338e96f874a0d29442396d6adf9c1e17aa2d
https://xenbits.xen.org/xsa/advisory-273.html
The 3.20180703.1 release for intel-microcode was the first batch of updates which targeted
most server type CPUs, additional models were supported in the 3.20180807a.1 release
EPSS
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.
ELSA-2018-4215: Unbreakable Enterprise kernel security update (IMPORTANT)
EPSS