Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-3693

Опубликовано: 10 июл. 2018
Источник: redhat
CVSS3: 5.9
EPSS Низкий

Описание

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions past bounds check. The flaw relies on the presence of a precisely-defined instruction sequence in the privileged code and the fact that memory writes occur to an address which depends on the untrusted value. Such writes cause an update into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to influence speculative execution and/or read privileged memory by conducting targeted cache side-channel attacks.

Отчет

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 5, 6, 7 and Red Hat Enterprise MRG 2 may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelAffected
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise MRG 2kernel-rtAffected
Red Hat Enterprise Linux 6kernelFixedRHSA-2018:239014.08.2018
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2018:239514.08.2018
Red Hat Enterprise Linux 7kernelFixedRHSA-2018:238414.08.2018
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2020:017421.01.2020
Red Hat Enterprise Linux 7.4 Extended Update SupportkernelFixedRHSA-2019:194630.07.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=1581650Kernel: speculative bounds check bypass store

EPSS

Процентиль: 78%
0.01192
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.6
ubuntu
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

CVSS3: 5.6
nvd
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

CVSS3: 5.6
debian
почти 7 лет назад

Systems with microprocessors utilizing speculative execution and branc ...

CVSS3: 5.6
github
около 3 лет назад

Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis.

CVSS3: 5.6
fstec
около 7 лет назад

Уязвимость процессоров Intel, ARM и AMD, связанная с особенностями функционирования модуля прогнозирования ветвлений, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 78%
0.01192
Низкий

5.9 Medium

CVSS3