Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2018-3665

Опубликовано: 21 июн. 2018
Источник: debian
EPSS Низкий

Описание

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.6.1-1package
xenfixed4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8package
xenignoredjessiepackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-267.html

  • https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html

  • Default eagerfpu=on on all CPUs: https://git.kernel.org/linus/58122bf1d856a4ea9581d62a07c557d997d46a19

  • Hard-disable lazy FPU mode: https://git.kernel.org/linus/ca6938a1cd8a1c5e861a99b67f84ac166fc2b9e7

EPSS

Процентиль: 79%
0.01319
Низкий

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 7 лет назад

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

CVSS3: 5.6
redhat
около 7 лет назад

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

CVSS3: 5.6
nvd
почти 7 лет назад

System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP3)

suse-cvrf
почти 7 лет назад

Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)

EPSS

Процентиль: 79%
0.01319
Низкий