Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-3620

Опубликовано: 14 авг. 2018
Источник: redhat
CVSS3: 5.6

Описание

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.

Отчет

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 5.9 Long LifekernelFixedRHSA-2018:260329.08.2018
Red Hat Enterprise Linux 5 Extended Lifecycle SupportkernelFixedRHSA-2018:260229.08.2018
Red Hat Enterprise Linux 6kernelFixedRHSA-2018:239014.08.2018
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2018:239414.08.2018
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2018:239314.08.2018
Red Hat Enterprise Linux 6.6 Advanced Update SupportkernelFixedRHSA-2018:239214.08.2018
Red Hat Enterprise Linux 6.6 Telco Extended Update SupportkernelFixedRHSA-2018:239214.08.2018
Red Hat Enterprise Linux 6.7 Extended Update SupportkernelFixedRHSA-2018:239114.08.2018
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:239514.08.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-226->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1585005Kernel: hw: cpu: L1 terminal fault (L1TF)

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
около 7 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

CVSS3: 5.6
nvd
около 7 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

CVSS3: 5.6
debian
около 7 лет назад

Systems with microprocessors utilizing speculative execution and addre ...

CVSS3: 5.6
github
больше 3 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

oracle-oval
около 7 лет назад

ELSA-2018-4215: Unbreakable Enterprise kernel security update (IMPORTANT)

5.6 Medium

CVSS3