Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-12127

Опубликовано: 14 мая 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

Microprocessors use a ‘load port’ subcomponent to perform load operations from memory or IO. During a load operation, the load port receives data from the memory or IO subsystem and then provides the data to the CPU registers and operations in the CPU’s pipelines. Stale load operations results are stored in the 'load port' table until overwritten by newer operations. Certain load-port operations triggered by an attacker can be used to reveal data about previous stale requests leaking data back to the attacker via a timing side-channel.

Отчет

Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the 'Vulnerability Response' URL.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelWill not fix
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Virtualization 4ovirt-guest-agentAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2019:116914.05.2019
Red Hat Enterprise Linux 6libvirtFixedRHSA-2019:118014.05.2019
Red Hat Enterprise Linux 6qemu-kvmFixedRHSA-2019:118114.05.2019
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2019:119614.05.2019
Red Hat Enterprise Linux 6.5 Advanced Update SupportlibvirtFixedRHSA-2019:119714.05.2019
Red Hat Enterprise Linux 6.5 Advanced Update Supportqemu-kvmFixedRHSA-2019:119814.05.2019
Red Hat Enterprise Linux 6.6 Advanced Update SupportkernelFixedRHSA-2019:119314.05.2019

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-226->CWE-203->CWE-385
https://bugzilla.redhat.com/show_bug.cgi?id=1667782hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS)

EPSS

Процентиль: 62%
0.00432
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 6 лет назад

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVSS3: 5.6
nvd
около 6 лет назад

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVSS3: 5.6
debian
около 6 лет назад

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some ...

CVSS3: 5.6
github
около 3 лет назад

Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf

CVSS3: 5.6
fstec
больше 6 лет назад

Уязвимость порта загрузки MLPDS микропрограммного обеспечения Intel, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальной информации

EPSS

Процентиль: 62%
0.00432
Низкий

6.5 Medium

CVSS3