Anfälligkeitssuche        Suche in 172616 CVE Beschreibungen
und 81291 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:
Kategorie:Red Hat Local Security Checks
Titel:RedHat Update for microcode_ctl RHSA-2018:0012-01
Zusammenfassung:The remote host is missing an update for the 'microcode_ctl'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'microcode_ctl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The microcode_ctl packages provide microcode
updates for Intel and AMD processors. Security Fix(es): * An industry-wide issue
was found in the way many modern microprocessor designs have implemented
speculative execution of instructions (a commonly used performance
optimization). There are three primary variants of the issue which differ in the
way the speculative execution can be exploited. Variant CVE-2017-5715 triggers
the speculative execution by utilizing branch target injection. It relies on the
presence of a precisely-defined instruction sequence in the privileged code as
well as the fact that memory accesses may cause allocation into the
microprocessor's data cache even for speculatively executed instructions that
never actually commit (retire). As a result, an unprivileged attacker could use
this flaw to cross the syscall and guest/host boundaries and read privileged
memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note:
This is the microcode counterpart of the CVE-2017-5715 kernel mitigation. Red
Hat would like to thank Google Project Zero for reporting this issue.

Affected Software/OS:
microcode_ctl on Red Hat Enterprise Linux Server (v. 7)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2017-5715
BugTraq ID: 102376
Bugtraq: 20190624 [SECURITY] [DSA 4469-1] libvirt security update (Google Search)
Bugtraq: 20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (Google Search)
CERT/CC vulnerability note: VU#180049
CERT/CC vulnerability note: VU#584653
Cisco Security Advisory: 20180104 CPU Side-Channel Information Disclosure Vulnerabilities
Debian Security Information: DSA-4120 (Google Search)
Debian Security Information: DSA-4187 (Google Search)
Debian Security Information: DSA-4188 (Google Search)
Debian Security Information: DSA-4213 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-19:26
RedHat Security Advisories: RHSA-2018:0292
SuSE Security Announcement: SUSE-SU-2018:0006 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0007 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0008 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0009 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0010 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0012 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0019 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0020 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0013 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0022 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0023 (Google Search)
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

Dies ist nur einer von 81291 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.

© 1998-2020 E-Soft Inc. Alle Rechte vorbehalten.