Описание
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
linux | fixed | 4.6.1-1 | package | |
xen | fixed | 4.8.3+xsa267+shim4.10.1+xsa267-1+deb9u8 | package | |
xen | ignored | jessie | package |
Примечания
https://xenbits.xen.org/xsa/advisory-267.html
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html
Default eagerfpu=on on all CPUs: https://git.kernel.org/linus/58122bf1d856a4ea9581d62a07c557d997d46a19
Hard-disable lazy FPU mode: https://git.kernel.org/linus/ca6938a1cd8a1c5e861a99b67f84ac166fc2b9e7
EPSS
Связанные уязвимости
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
Security update for the Linux Kernel (Live Patch 11 for SLE 12 SP3)
Security update for the Linux Kernel (Live Patch 4 for SLE 12 SP3)
EPSS