Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-3620

Опубликовано: 14 авг. 2018
Источник: redhat
CVSS3: 5.6
EPSS Низкий

Описание

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

Modern operating systems implement virtualization of physical memory to efficiently use available system resources and provide inter-domain protection through access control and isolation. The L1TF issue was found in the way the x86 microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization) in combination with handling of page-faults caused by terminated virtual to physical address resolving process. As a result, an unprivileged attacker could use this flaw to read privileged memory of the kernel or other processes and/or cross guest/host boundaries to read host memory by conducting targeted cache side-channel attacks.

Отчет

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 5.9 Long LifekernelFixedRHSA-2018:260329.08.2018
Red Hat Enterprise Linux 5 Extended Lifecycle SupportkernelFixedRHSA-2018:260229.08.2018
Red Hat Enterprise Linux 6kernelFixedRHSA-2018:239014.08.2018
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2018:239414.08.2018
Red Hat Enterprise Linux 6.5 Advanced Update SupportkernelFixedRHSA-2018:239314.08.2018
Red Hat Enterprise Linux 6.6 Advanced Update SupportkernelFixedRHSA-2018:239214.08.2018
Red Hat Enterprise Linux 6.6 Telco Extended Update SupportkernelFixedRHSA-2018:239214.08.2018
Red Hat Enterprise Linux 6.7 Extended Update SupportkernelFixedRHSA-2018:239114.08.2018
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:239514.08.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-226->CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1585005Kernel: hw: cpu: L1 terminal fault (L1TF)

EPSS

Процентиль: 86%
0.03023
Низкий

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

CVSS3: 5.6
nvd
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

CVSS3: 5.6
debian
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and addre ...

CVSS3: 5.6
github
около 3 лет назад

Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a terminal page fault and a side-channel analysis.

oracle-oval
почти 7 лет назад

ELSA-2018-4215: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 86%
0.03023
Низкий

5.6 Medium

CVSS3