Описание
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
A flaw was found in the implementation of the "fill buffer", a mechanism used by modern CPUs when a cache-miss is made on L1 CPU cache. If an attacker can generate a load operation that would create a page fault, the execution will continue speculatively with incorrect data from the fill buffer while the data is fetched from higher level caches. This response time can be measured to infer data in the fill buffer.
Отчет
Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the 'Vulnerability Response' URL.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | kernel | Will not fix | ||
Red Hat Enterprise Linux 7 | kernel-alt | Not affected | ||
Red Hat Virtualization 4 | ovirt-guest-agent | Affected | ||
Red Hat Enterprise Linux 6 | kernel | Fixed | RHSA-2019:1169 | 14.05.2019 |
Red Hat Enterprise Linux 6 | libvirt | Fixed | RHSA-2019:1180 | 14.05.2019 |
Red Hat Enterprise Linux 6 | qemu-kvm | Fixed | RHSA-2019:1181 | 14.05.2019 |
Red Hat Enterprise Linux 6.5 Advanced Update Support | kernel | Fixed | RHSA-2019:1196 | 14.05.2019 |
Red Hat Enterprise Linux 6.5 Advanced Update Support | libvirt | Fixed | RHSA-2019:1197 | 14.05.2019 |
Red Hat Enterprise Linux 6.5 Advanced Update Support | qemu-kvm | Fixed | RHSA-2019:1198 | 14.05.2019 |
Red Hat Enterprise Linux 6.6 Advanced Update Support | kernel | Fixed | RHSA-2019:1193 | 14.05.2019 |
Показывать по
Дополнительная информация
Статус:
EPSS
6.2 Medium
CVSS3
Связанные уязвимости
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on ...
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
Уязвимость процессоров Intel, связанная с восстановлением содержимого буферов заполнения (MFBDS), позволяющая нарушителю раскрыть защищаемую информацию
EPSS
6.2 Medium
CVSS3