A microprocessor side-channel vulnerability was found on SMT (e.g, Hyper-Threading) architectures. An attacker running a malicious process on the same core of the processor as the victim process can extract certain secret information.
Find out more about CVE-2018-5407 from the MITRE CVE dictionary dictionary and NIST NVD.
This is a timing side-channel flaw on processors which implement SMT/Hyper-Threading architectures. It can result in leakage of secret data in applications such as OpenSSL that has secret dependent control flow at any granularity level. In order to exploit this flaw, the attacker needs to run a malicious process on the same core of the processor as the victim process.
NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.
CVSS3 Base Score | 4.8 |
---|---|
CVSS3 Base Metrics | CVSS:3.0/AV:P/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N |
Attack Vector | Physical |
Attack Complexity | High |
Privileges Required | Low |
User Interaction | None |
Scope | Changed |
Confidentiality | High |
Integrity Impact | None |
Availability Impact | None |
Platform | Package | State |
---|---|---|
Red Hat Virtualization 4 | rhvm-appliance | Affected |
Red Hat Virtualization 4 | redhat-virtualization-host | Affected |
Red Hat JBoss Web Server 5 | openssl | Affected |
Red Hat JBoss Web Server 3 | openssl | Will not fix |
Red Hat JBoss EWS 2 | openssl | Will not fix |
Red Hat JBoss EAP 6 | openssl | Will not fix |
Red Hat JBoss EAP 5 | openssl | Will not fix |
Red Hat JBoss Core Services 1 | openssl | Affected |
Red Hat Enterprise Linux 7 | OVMF | Affected |
Red Hat Enterprise Linux 7 | openssl098e | Will not fix |
Red Hat Enterprise Linux 7 | openssl | Affected |
Red Hat Enterprise Linux 6 | openssl | Will not fix |
Red Hat Enterprise Linux 6 | openssl098e | Will not fix |
Red Hat Enterprise Linux 5 | openssl | Will not fix |
Red Hat Enterprise Linux 5 | openssl097a | Will not fix |
At this time Red Hat Engineering is working on patches for openssl package in Red Hat Enterprise Linux 7 to address this issue. Until fixes are available, users are advised to review the guidance supplied in the L1 Terminal Fault vulnerability article: https://access.redhat.com/security/vulnerabilities/L1TF and decide what their exposure across shared CPU threads are and act accordingly.