2.1
CVSSv2

CVE-2018-3639

Published: 22/05/2018 Updated: 13/08/2021
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 220
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel atom c c2308

intel atom c c3308

intel atom c c3338

intel atom c c3508

intel atom c c3538

intel atom c c3558

intel atom c c3708

intel atom c c3750

intel atom c c3758

intel atom c c3808

intel atom c c3830

intel atom c c3850

intel atom c c3858

intel atom c c3950

intel atom c c3955

intel atom c c3958

intel atom e e3805

intel atom e e3815

intel atom e e3825

intel atom e e3826

intel atom e e3827

intel atom e e3845

intel atom x5-e3930 -

intel atom x5-e3940 -

intel atom x7-e3950 -

intel atom z z2420

intel atom z z2460

intel atom z z2480

intel atom z z2520

intel atom z z2560

intel atom z z2580

intel atom z z2760

intel atom z z3460

intel atom z z3480

intel atom z z3530

intel atom z z3560

intel atom z z3570

intel atom z z3580

intel atom z z3590

intel atom z z3735d

intel atom z z3735e

intel atom z z3735f

intel atom z z3735g

intel atom z z3736f

intel atom z z3736g

intel atom z z3740

intel atom z z3740d

intel atom z z3745

intel atom z z3745d

intel atom z z3770

intel atom z z3770d

intel atom z z3775

intel atom z z3775d

intel atom z z3785

intel atom z z3795

intel celeron j j3455

intel celeron j j4005

intel celeron j j4105

intel celeron n n3450

intel core i3 32nm

intel core i3 45nm

intel core i5 32nm

intel core i5 45nm

intel core i7 32nm

intel core i7 45nm

intel core m 32nm

intel core m 45nm

intel pentium n4000

intel pentium n4100

intel pentium n4200

intel pentium j j4205

intel pentium silver j5005

intel pentium silver n5000

intel xeon e-1105c -

intel xeon e3 125c_

intel xeon e3 1220_

intel xeon e3 1275_

intel xeon e3 1505m_v6

intel xeon e3 1515m_v5

intel xeon e3 1535m_v5

intel xeon e3 1535m_v6

intel xeon e3 1545m_v5

intel xeon e3 1558l_v5

intel xeon e3 1565l_v5

intel xeon e3 1575m_v5

intel xeon e3 1578l_v5

intel xeon e3 1585_v5

intel xeon e3 1585l_v5

intel xeon e3 3600

intel xeon e3 5600

intel xeon e3 7500

intel xeon e3 e5502

intel xeon e3 e5503

intel xeon e3 e5504

intel xeon e3 e5506

intel xeon e3 e5507

intel xeon e3 e5520

intel xeon e3 e5530

intel xeon e3 e5540

intel xeon e3 e6510

intel xeon e3 e6540

intel xeon e3 e6550

intel xeon e3 l3403

intel xeon e3 l3406

intel xeon e3 l3426

intel xeon e3 l5506

intel xeon e3 l5508_

intel xeon e3 l5518_

intel xeon e3 l5520

intel xeon e3 l5530

intel xeon e3 w5580

intel xeon e3 w5590

intel xeon e3 x3430

intel xeon e3 x3440

intel xeon e3 x3450

intel xeon e3 x3460

intel xeon e3 x3470

intel xeon e3 x3480

intel xeon e3 x5550

intel xeon e3 x5560

intel xeon e3 x5570

intel xeon e3 1105c v2 -

intel xeon e3 1125c v2 -

intel xeon e3 12201 -

intel xeon e3 12201 v2 -

intel xeon e3 1220 v2 -

intel xeon e3 1220 v3 -

intel xeon e3 1220 v5 -

intel xeon e3 1220 v6 -

intel xeon e3 1220l v3 -

intel xeon e3 1225 -

intel xeon e3 1225 v2 -

intel xeon e3 1225 v3 -

intel xeon e3 1225 v5 -

intel xeon e3 1225 v6 -

intel xeon e3 1226 v3 -

intel xeon e3 1230 -

intel xeon e3 1230 v2 -

intel xeon e3 1230 v3 -

intel xeon e3 1230 v5 -

intel xeon e3 1230 v6 -

intel xeon e3 1230l v3 -

intel xeon e3 1231 v3 -

intel xeon e3 1235 -

intel xeon e3 1235l v5 -

intel xeon e3 1240 -

intel xeon e3 1240 v2 -

intel xeon e3 1240 v3 -

intel xeon e3 1240 v5 -

intel xeon e3 1240 v6 -

intel xeon e3 1240l v3 -

intel xeon e3 1240l v5 -

intel xeon e3 1241 v3 -

intel xeon e3 1245 -

intel xeon e3 1245 v2 -

intel xeon e3 1245 v3 -

intel xeon e3 1245 v5 -

intel xeon e3 1245 v6 -

intel xeon e3 1246 v3 -

intel xeon e3 1258l v4 -

intel xeon e3 1260l -

intel xeon e3 1260l v5 -

intel xeon e3 1265l v2 -

intel xeon e3 1265l v3 -

intel xeon e3 1265l v4 -

intel xeon e3 1268l v3 -

intel xeon e3 1268l v5 -

intel xeon e3 1270 -

intel xeon e3 1270 v2 -

intel xeon e3 1270 v3 -

intel xeon e3 1270 v5 -

intel xeon e3 1270 v6 -

intel xeon e3 1271 v3 -

intel xeon e3 1275 v2 -

intel xeon e3 1275 v3 -

intel xeon e3 1275 v5 -

intel xeon e3 1275 v6 -

intel xeon e3 1275l v3 -

intel xeon e3 1276 v3 -

intel xeon e3 1278l v4 -

intel xeon e3 1280 -

intel xeon e3 1280 v2 -

intel xeon e3 1280 v3 -

intel xeon e3 1280 v5 -

intel xeon e3 1280 v6 -

intel xeon e3 1281 v3 -

intel xeon e3 1285 v3 -

intel xeon e3 1285 v4 -

intel xeon e3 1285 v6 -

intel xeon e3 1285l v3 -

intel xeon e3 1285l v4 -

intel xeon e3 1286 v3 -

intel xeon e3 1286l v3 -

intel xeon e3 1290 -

intel xeon e3 1290 v2 -

intel xeon e3 1501l v6 -

intel xeon e3 1501m v6 -

intel xeon e3 1505l v5 -

intel xeon e3 1505l v6 -

intel xeon e3 1505m v5 -

intel xeon e5 2650l_v4

intel xeon e5 2658

intel xeon e5 2658_v2

intel xeon e5 2658_v3

intel xeon e5 2658_v4

intel xeon e5 2658a_v3

intel xeon e5 2660

intel xeon e5 2660_v2

intel xeon e5 2660_v3

intel xeon e5 2660_v4

intel xeon e5 2665

intel xeon e5 2667

intel xeon e5 2667_v2

intel xeon e5 2667_v3

intel xeon e5 2667_v4

intel xeon e5 2670

intel xeon e5 2670_v2

intel xeon e5 2670_v3

intel xeon e5 2680

intel xeon e5 2680_v2

intel xeon e5 2680_v3

intel xeon e5 2680_v4

intel xeon e5 2683_v3

intel xeon e5 2683_v4

intel xeon e5 2687w

intel xeon e5 2687w_v2

intel xeon e5 2687w_v3

intel xeon e5 2687w_v4

intel xeon e5 2690

intel xeon e5 2690_v2

intel xeon e5 2690_v3

intel xeon e5 2690_v4

intel xeon e5 2695_v2

intel xeon e5 2695_v3

intel xeon e5 2695_v4

intel xeon e5 2697_v2

intel xeon e5 2697_v3

intel xeon e5 2697_v4

intel xeon e5 2697a_v4

intel xeon e5 2698_v3

intel xeon e5 2698_v4

intel xeon e5 2699_v3

intel xeon e5 2699_v4

intel xeon e5 2699a_v4

intel xeon e5 2699r_v4

intel xeon e5 4603

intel xeon e5 4603_v2

intel xeon e5 4607

intel xeon e5 4607_v2

intel xeon e5 4610

intel xeon e5 4610_v2

intel xeon e5 4610_v3

intel xeon e5 4610_v4

intel xeon e5 4617

intel xeon e5 4620

intel xeon e5 4620_v2

intel xeon e5 4620_v3

intel xeon e5 4620_v4

intel xeon e5 4624l_v2

intel xeon e5 4627_v2

intel xeon e5 4627_v3

intel xeon e5 4627_v4

intel xeon e5 4628l_v4

intel xeon e5 4640

intel xeon e5 4640_v2

intel xeon e5 4640_v3

intel xeon e5 4640_v4

intel xeon e5 4648_v3

intel xeon e5 4650

intel xeon e5 4650_v2

intel xeon e5 4650_v3

intel xeon e5 4650_v4

intel xeon e5 4650l

intel xeon e5 4655_v3

intel xeon e5 4655_v4

intel xeon e5 4657l_v2

intel xeon e5 4660_v3

intel xeon e5 4660_v4

intel xeon e5 4667_v3

intel xeon e5 4667_v4

intel xeon e5 4669_v3

intel xeon e5 4669_v4

intel xeon e5 1428l -

intel xeon e5 1428l v2 -

intel xeon e5 1428l v3 -

intel xeon e5 1620 -

intel xeon e5 1620 v2 -

intel xeon e5 1620 v3 -

intel xeon e5 1620 v4 -

intel xeon e5 1630 v3 -

intel xeon e5 1630 v4 -

intel xeon e5 1650 -

intel xeon e5 1650 v2 -

intel xeon e5 1650 v3 -

intel xeon e5 1650 v4 -

intel xeon e5 1660 -

intel xeon e5 1660 v2 -

intel xeon e5 1660 v3 -

intel xeon e5 1660 v4 -

intel xeon e5 1680 v3 -

intel xeon e5 1680 v4 -

intel xeon e5 2403 -

intel xeon e5 2403 v2 -

intel xeon e5 2407 -

intel xeon e5 2407 v2 -

intel xeon e5 2408l v3 -

intel xeon e5 2418l -

intel xeon e5 2418l v2 -

intel xeon e5 2418l v3 -

intel xeon e5 2420 -

intel xeon e5 2420 v2 -

intel xeon e5 2428l -

intel xeon e5 2428l v2 -

intel xeon e5 2428l v3 -

intel xeon e5 2430 -

intel xeon e5 2430 v2 -

intel xeon e5 2430l -

intel xeon e5 2430l v2 -

intel xeon e5 2438l v3 -

intel xeon e5 2440 -

intel xeon e5 2440 v2 -

intel xeon e5 2448l -

intel xeon e5 2448l v2 -

intel xeon e5 2450 -

intel xeon e5 2450 v2 -

intel xeon e5 2450l -

intel xeon e5 2450l v2 -

intel xeon e5 2470 -

intel xeon e5 2470 v2 -

intel xeon e5 2603 -

intel xeon e5 2603 v2 -

intel xeon e5 2603 v3 -

intel xeon e5 2603 v4 -

intel xeon e5 2608l v3 -

intel xeon e5 2608l v4 -

intel xeon e5 2609 -

intel xeon e5 2609 v2 -

intel xeon e5 2609 v3 -

intel xeon e5 2609 v4 -

intel xeon e5 2618l v2 -

intel xeon e5 2618l v3 -

intel xeon e5 2618l v4 -

intel xeon e5 2620 -

intel xeon e5 2620 v2 -

intel xeon e5 2620 v3 -

intel xeon e5 2620 v4 -

intel xeon e5 2623 v3 -

intel xeon e5 2623 v4 -

intel xeon e5 2628l v2 -

intel xeon e5 2628l v3 -

intel xeon e5 2628l v4 -

intel xeon e5 2630 -

intel xeon e5 2630 v2 -

intel xeon e5 2630 v3 -

intel xeon e5 2630 v4 -

intel xeon e5 2630l -

intel xeon e5 2630l v2 -

intel xeon e5 2630l v3 -

intel xeon e5 2630l v4 -

intel xeon e5 2637 -

intel xeon e5 2637 v2 -

intel xeon e5 2637 v3 -

intel xeon e5 2637 v4 -

intel xeon e5 2640 -

intel xeon e5 2640 v2 -

intel xeon e5 2640 v3 -

intel xeon e5 2640 v4 -

intel xeon e5 2643 -

intel xeon e5 2643 v2 -

intel xeon e5 2643 v3 -

intel xeon e5 2643 v4 -

intel xeon e5 2648l -

intel xeon e5 2648l v2 -

intel xeon e5 2648l v3 -

intel xeon e5 2648l v4 -

intel xeon e5 2650 -

intel xeon e5 2650 v2 -

intel xeon e5 2650 v3 -

intel xeon e5 2650 v4 -

intel xeon e5 2650l -

intel xeon e5 2650l v2 -

intel xeon e5 2650l v3 -

intel xeon e7 2803

intel xeon e7 2820

intel xeon e7 2830

intel xeon e7 2850

intel xeon e7 2850_v2

intel xeon e7 2860

intel xeon e7 2870

intel xeon e7 2870_v2

intel xeon e7 2880_v2

intel xeon e7 2890_v2

intel xeon e7 4807

intel xeon e7 4809_v2

intel xeon e7 4809_v3

intel xeon e7 4809_v4

intel xeon e7 4820

intel xeon e7 4820_v2

intel xeon e7 4820_v3

intel xeon e7 4820_v4

intel xeon e7 4830

intel xeon e7 4830_v2

intel xeon e7 4830_v3

intel xeon e7 4830_v4

intel xeon e7 4850

intel xeon e7 4850_v2

intel xeon e7 4850_v3

intel xeon e7 4850_v4

intel xeon e7 4860

intel xeon e7 4860_v2

intel xeon e7 4870

intel xeon e7 4870_v2

intel xeon e7 4880_v2

intel xeon e7 4890_v2

intel xeon e7 8830

intel xeon e7 8837

intel xeon e7 8850

intel xeon e7 8850_v2

intel xeon e7 8857_v2

intel xeon e7 8860

intel xeon e7 8860_v3

intel xeon e7 8860_v4

intel xeon e7 8867_v3

intel xeon e7 8867_v4

intel xeon e7 8867l

intel xeon e7 8870

intel xeon e7 8870_v2

intel xeon e7 8870_v3

intel xeon e7 8870_v4

intel xeon e7 8880_v2

intel xeon e7 8880_v3

intel xeon e7 8880_v4

intel xeon e7 8880l_v2

intel xeon e7 8880l_v3

intel xeon e7 8890_v2

intel xeon e7 8890_v3

intel xeon e7 8890_v4

intel xeon e7 8891_v2

intel xeon e7 8891_v3

intel xeon e7 8891_v4

intel xeon e7 8893_v2

intel xeon e7 8893_v3

intel xeon e7 8893_v4

intel xeon e7 8894_v4

intel xeon gold 5115

intel xeon gold 85115

intel xeon gold 85118

intel xeon gold 85119t

intel xeon gold 85120

intel xeon gold 85120t

intel xeon gold 85122

intel xeon gold 86126

intel xeon gold 86126f

intel xeon gold 86126t

intel xeon gold 86128

intel xeon gold 86130

intel xeon gold 86130f

intel xeon gold 86130t

intel xeon gold 86132

intel xeon gold 86134

intel xeon gold 86134m

intel xeon gold 86136

intel xeon gold 86138

intel xeon gold 86138f

intel xeon gold 86138t

intel xeon gold 86140

intel xeon gold 86140m

intel xeon gold 86142

intel xeon gold 86142f

intel xeon gold 86142m

intel xeon gold 86144

intel xeon gold 86146

intel xeon gold 86148

intel xeon gold 86148f

intel xeon gold 86150

intel xeon gold 86152

intel xeon gold 86154

intel xeon platinum 8153

intel xeon platinum 8156

intel xeon platinum 8158

intel xeon platinum 8160

intel xeon platinum 8160f

intel xeon platinum 8160m

intel xeon platinum 8160t

intel xeon platinum 8164

intel xeon platinum 8168

intel xeon platinum 8170

intel xeon platinum 8170m

intel xeon platinum 8176

intel xeon platinum 8176f

intel xeon platinum 8176m

intel xeon platinum 8180

intel xeon silver 4108

intel xeon silver 4109t

intel xeon silver 4110

intel xeon silver 4112

intel xeon silver 4114

intel xeon silver 4114t

intel xeon silver 4116

intel xeon silver 4116t

arm cortex-a 15

arm cortex-a 57

arm cortex-a 72

redhat mrg realtime 2.0

redhat openstack 7.0

redhat openstack 8

redhat openstack 9

redhat openstack 10

redhat openstack 12

redhat openstack 13

redhat virtualization manager 4.2

redhat virtualization manager 4.3

redhat enterprise linux desktop 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux eus 6.7

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux eus 7.6

redhat enterprise linux eus 7.7

redhat enterprise linux server 6.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 5.9

redhat enterprise linux server aus 6.4

redhat enterprise linux server aus 6.5

redhat enterprise linux server aus 6.6

redhat enterprise linux server aus 7.2

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 6.6

redhat enterprise linux server tus 7.2

redhat enterprise linux server tus 7.3

redhat enterprise linux server tus 7.4

redhat enterprise linux server tus 7.6

redhat enterprise linux server tus 7.7

redhat enterprise linux workstation 6.0

redhat enterprise linux workstation 7.0

debian debian linux 8.0

debian debian linux 9.0

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 16.04

canonical ubuntu linux 17.10

canonical ubuntu linux 18.04

siemens itc1500_firmware

siemens itc1500_pro_firmware

siemens itc1900_firmware

siemens itc1900_pro_firmware

siemens itc2200_firmware

siemens itc2200_pro_firmware

oracle local service management system

oracle solaris 11

siemens ruggedcom_ape_firmware -

siemens simatic_et_200_sp_firmware

siemens simatic_field_pg_m4_firmware

siemens simatic_field_pg_m5_firmware

siemens simatic_ipc3000_smart_firmware

siemens simatic_ipc347e_firmware

siemens simatic_ipc427c_firmware -

siemens simatic_ipc427d_firmware

siemens simatic_ipc427e_firmware

siemens simatic_ipc477c_firmware -

siemens simatic_ipc477d_firmware

siemens simatic_ipc477e_firmware

siemens simatic_ipc477e_pro_firmware

siemens simatic_ipc547e_firmware

siemens simatic_ipc547g_firmware

siemens simatic_ipc627c_firmware

siemens simatic_ipc627d_firmware

siemens simatic_ipc647c_firmware

siemens simatic_ipc647d_firmware

siemens simatic_ipc677d_firmware

siemens simatic_ipc677c_firmware

siemens simatic_ipc827c_firmware

siemens simatic_ipc827d_firmware

siemens simatic_ipc847c_firmware

siemens simatic_ipc847d_firmware

siemens simatic_itp1000_firmware

siemens simatic_s7-1500_firmware

siemens simotion_p320-4e_firmware

siemens sinumerik_840_d_sl_firmware -

siemens sinumerik_pcu_50.5_firmware

siemens sinumerik_tcu_30.3_firmware -

siemens sinema_remote_connect_firmware -

mitel micollab -

mitel open integration gateway -

mitel mivoice border gateway -

mitel mivoice business -

mitel mivoice connect -

mitel mivoic mx-one -

mitel mivoice 5000 -

mitel micloud management portal

sonicwall sonicosv -

sonicwall web application firewall -

sonicwall cloud global management system -

sonicwall email security -

sonicwall secure mobile access -

sonicwall global management system -

schneider-electric struxureware data center expert

redhat virtualization 4.0

nvidia jetson tx1

nvidia jetson tx2

microsoft surface -

microsoft surface book -

microsoft surface book 2

microsoft surface pro 3

microsoft surface pro 4

microsoft surface pro 1796

microsoft surface pro with lte advanced 1807

microsoft surface studio -

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 10 1703

microsoft windows 10 1709

microsoft windows 10 1803

microsoft windows 10 1809

microsoft windows 7 -

microsoft windows 8.1 -

microsoft windows server 2008 r2

microsoft windows server 2008 sp2

microsoft windows server 2012 -

microsoft windows server 2012 r2

microsoft windows server 2016 -

microsoft windows server 2016 1709

microsoft windows server 2016 1803

Vendor Advisories

This update ships updated CPU microcode for some types of Intel CPUs and provides SSBD support (needed to address Spectre v4) and fixes for Spectre v3a For the stable distribution (stretch), these problems have been fixed in version 3201807032~deb9u1 We recommend that you upgrade your intel-microcode packages For the detailed security status o ...
This update provides mitigations for the Spectre v4 variant in x86-based micro processors On Intel CPUs this requires updated microcode which is currently not released publicly (but your hardware vendor may have issued an update) For servers with AMD CPUs no microcode update is needed, please refer to xenbitsxenorg/xsa/advisory-263html ...
Two vulnerabilities were discovered in Libvirt, a virtualisation abstraction library, allowing an API client with read-only permissions to execute arbitrary commands via the virConnectGetDomainCapabilities API, or read or execute arbitrary files via the virDomainSaveImageGetXMLDesc API Additionally the libvirt's cpu map was updated to make address ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
Several security issues were addressed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Side channel execution mitigations were added to QEMU ...
Several security issues were addressed in the Linux kernel ...
Several security issues were fixed in the Linux kernel ...
Side channel execution mitigations were added to QEMU ...
Several security issues were addressed in the Linux kernel ...
Several security issues were addressed in the Linux kernel ...
The system could be made to expose sensitive information ...
Several security issues were addressed in the Linux kernel ...
Side channel execution mitigations were added to libvirt ...
On May 21, 2018, researchers disclosed two vulnerabilities that take advantage of the implementation of speculative execution of instructions on many modern microprocessor architectures to perform side-channel information disclosure attacks These vulnerabilities could allow an unprivileged, local attacker, in specific circumstances, to read privil ...
Debian Bug report logs - #911470 qemu: CVE-2018-18438: Integer overflow in ccid_card_vscard_read() allows memory corruption Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Oct 2018 14:51:02 UTC ...
Debian Bug report logs - #915884 qemu: CVE-2018-16867: dev-mtp: path traversal in usb_mtp_write_data of the Media Transfer Protocol (MTP) Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 7 Dec 2018 ...
Debian Bug report logs - #902725 CVE-2018-12617 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Fri, 29 Jun 2018 21:09:06 UTC Severity: important Tags: security Found in version qemu/1:212+dfsg-3 Fixed in ...
Debian Bug report logs - #911499 qemu: CVE-2018-17958: rtl8139: integer overflow leads to buffer overflow Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Oct 2018 21:15:01 UTC Severity: import ...
Debian Bug report logs - #914604 qemu: CVE-2018-18954: ppc64: Out-of-bounds r/w stack access in pnv_lpc_do_eccb Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 25 Nov 2018 15:48:01 UTC Severity: i ...
Debian Bug report logs - #911468 qemu: CVE-2018-17962: pcnet: integer overflow leads to buffer overflow Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Oct 2018 14:45:03 UTC Severity: grave Tag ...
Debian Bug report logs - #914727 qemu: CVE-2018-19489: 9pfs: crash due to race condition in renaming files Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Mon, 26 Nov 2018 18:21:01 UTC Severity: import ...
Debian Bug report logs - #910431 qemu: CVE-2018-10839: integer overflow leads to buffer overflow issue Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 6 Oct 2018 07:42:02 UTC Severity: grave Tags ...
Debian Bug report logs - #907500 qemu: CVE-2018-15746: seccomp: blacklist is not applied to all threads Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Tue, 28 Aug 2018 19:57:04 UTC Severity: important ...
Debian Bug report logs - #912535 qemu: CVE-2018-18849 Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 1 Nov 2018 07:18:02 UTC Severity: important Tags: patch, security, upstream Found in version ...
Debian Bug report logs - #911469 qemu: CVE-2018-17963: net: ignore packets with large size Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 20 Oct 2018 14:45:07 UTC Severity: grave Tags: security, ...
Debian Bug report logs - #914599 qemu: CVE-2018-19364: Use-after-free due to race condition while updating fid path Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sun, 25 Nov 2018 15:09:01 UTC Severit ...
Debian Bug report logs - #901017 qemu: CVE-2018-11806: slirp: heap buffer overflow while reassembling fragmented datagrams Package: src:qemu; Maintainer for src:qemu is Debian QEMU Team <pkg-qemu-devel@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 8 Jun 2018 03:42:01 UTC ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An out-of-bounds read access issue was found in the VGA display emulator built into the Quick emulator (QEMU) It could occur while reading VGA memory to update graphics display A privileged user/process inside guest could use this flaw to crash the QEMU process on the host resulting in denial of service situation(CVE-2017-13672) A memory leakage ...
An incomplete fix for CVE-2018-5748 that affects QEMU monitor leading to a resource exhaustion but now also triggered via QEMU guest agent(CVE-2018-1064) qemu/qemu_monitorc in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply(CVE-2018-5748) An industry-wide issue was found in the way many modern mi ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An out-of-bounds read access issue was found in the VGA display emulator built into the Quick emulator (QEMU) It could occur while reading VGA memory to update graphics display A privileged user/process inside guest could use this flaw to crash the QEMU process on the host resulting in denial of service situation(CVE-2017-13672) A memory leakage ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions (a commonly used performance optimization) It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a r ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 13Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CV ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP S ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 5 Extended Lifecycle SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform10Red Hat Product Security has rated this update as having a security impactof Important A Common Vulnerability Scoring System (CVSS ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform9Red Hat Product Security has rated this update as having a security impactof Important A Common Vulnerability Scoring System (CVSS) ...
Synopsis Important: kernel security, bug fix, and enhancement update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Comm ...
Synopsis Important: rhev-hypervisor7 security update Type/Severity Security Advisory: Important Topic An update for rhev-hypervisor7 is now available for RHEV 3X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 6 and RHEV 3X Hypervisor and Agents Extended Lifecycle Support for ...
Synopsis Important: rhev-hypervisor7 security update Type/Severity Security Advisory: Important Topic An update for rhev-hypervisor7 is now available for RHEV 3X Hypervisor and Agents for Red Hat Enterprise Linux 6 and RHEV 3X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7 ...
Synopsis Important: redhat-virtualization-host security update Type/Severity Security Advisory: Important Topic An update for redhat-virtualization-host is now available for RHEV 3X Hypervisor and Agents Extended Lifecycle Support for Red Hat Enterprise Linux 7Red Hat Product Security has rated this updat ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: java-170-openjdk security update Type/Severity Security Advisory: Important Topic An update for java-170-openjdk is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: qemu-kvm-rhev security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform8Red Hat Product Security has rated this update as having a security impactof Important A Common Vulnerability Scoring System (CVSS) ...
Synopsis Important: rhevm-setup-plugins security update Type/Severity Security Advisory: Important Topic An update for rhevm-setup-plugins is now available for RHEV Manager version 36Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 65 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 67 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerabili ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scori ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: kernel-rt security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel-rt is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (C ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services ...
Synopsis Important: java-180-openjdk security update Type/Severity Security Advisory: Important Topic An update for java-180-openjdk is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: redhat-virtualization-host security update Type/Severity Security Advisory: Important Topic An update for redhat-virtualization-host is now available for Red Hat Virtualization 4 for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of ...
Synopsis Important: kernel security update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 64 Advanced Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring S ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 74 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: kernel security and bug fix update Type/Severity Security Advisory: Important Topic An update for kernel is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) b ...
Synopsis Important: libvirt security update Type/Severity Security Advisory: Important Topic An update for libvirt is now available for Red Hat Enterprise Linux 73 Extended Update SupportRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring ...
Synopsis Important: qemu-kvm security update Type/Severity Security Advisory: Important Topic An update for qemu-kvm is now available for Red Hat Enterprise Linux 72 Advanced Update Support, Red Hat Enterprise Linux 72 Telco Extended Update Support, and Red Hat Enterprise Linux 72 Update Services for SAP ...

Exploits

/* ======== Intro / Overview ======== After Michael Schwarz made some interesting observations, we started looking into variants other than the three already-known ones I noticed that Intel's Optimization Manual says in section 2445 ("Memory Disambiguation"): A load instruction micro-op may depend on a preceding store Many microarchi ...

Mailing Lists

<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2018-10-30-9 Additional information for APPLE-SA-2018-9-24-1 macOS Mojave 1014 <!--X-Subject-Header-End--> < ...
<!--X-Body-Begin--> <!--X-User-Header--> Full Disclosure mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> APPLE-SA-2018-10-30-2 macOS Mojave 10141, Security Update 2018-001 High Sierra, Security Update 2018-005 Sierra <!-- ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 <!--X-Subject-Header-End--> <!--X-Head ...
<!--X-Body-Begin--> <!--X-User-Header--> oss-sec mailing list archives <!--X-User-Header-End--> <!--X-TopPNI--> By Date By Thread </form> <!--X-TopPNI-End--> <!--X-MsgBody--> <!--X-Subject-Header-Begin--> kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768 <!--X-Subject-Header-End--> <!--X-Head-of- ...

Github Repositories

Speculation control powershell script

Overview SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown) For an explanation on how to interpret the output of this tool, please see Understanding Get-SpeculationControlSettings PowerShell

Command like tool to print mitigation flags for running processes in a memory dump

MitigationFlagsCliTool Prints mitigation policy information for processes in a dump file Usage -d [dump file] - specify dump file -l - query current machine (must run elevated) -k [target machine information] - live kernel debugging (Example: -k net:port:50000,key:1111,target:1234) -e - Only print enabled mitigations for process -m [mitigation,mitigation,] - Only prin

Modern computer systems are facing security challenges and thus are forced to employ various encryption, mitigation mechanisms, and other measures that affect significantly their performance. In this study, we aim to identify the energy and run-time performance implications of Meltdown and Spectre mitigation mechanisms.

Efficient_computering_in_safe_environments Research where we try to achieve the most energy savings and run-time performance by turning off unnecessary protection mechanisms of the modern computer systems The idea is that in a protected controlled environment (eg on a non-cloud data center or a single tenant machine) one can get a measurable performance boost by dispensing wi

Tools to exercise the Linux kernel mitigation for CVE-2018-3639 (aka Variant 4) using the Speculative Store Bypass Disable (SSBD) feature of x86 processors

Tools for exercising Speculative Store Bypass Disable The ssbd-tools project is a collection of programs that makes use of the Speculative Store Bypass Disable (SSBD) functionality provided in x86 processors SSBD is a processor based mitigation for the Speculative Store Bypass attack that is referred to as Variant 4 and assigned CVE-2018-3639 The Linux kernel introduced per-p

Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux

CVE-2018-3639 Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux Download git clone git@githubcom:mmxsrup/CVE-2018-3639git Build cd CVE-2018-3639 make Run /specter Output $ /spectre idx: 0, highest:P, hitrate:21340000 idx: 1, highest:A, hit

utility to make links to CVE detail sites

CVElinker $$\ $$\ $$\ $$ |\__| $$ | $$$$$$$\ $$\ $$\ $$$$$$\ $$ |$$\ $$$$$$$\ $$ | $$\ $$$$$$\ $$$$$$\ $$ _____|\$$\ $$ |$$ __$$\ $$ |$$ |$$ __$$\ $$ | $$ |$$ __$$\ $$ __$$\ $$ / \$$\$$ / $$$$$$$$ |$$ |$$ |$$ | $$ |$$$$$$ / $$$$$$$$ |$$ | \__| $$ | \$$$ / $$

spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux

CVE-2018-3639-specter-v4 spectre v4 : Speculative Store Bypass (CVE-2018-3639) proof of concept for Linux build: gcc spectre-v4cpp -o spectre run: /spectre result: --------attack-------- low than threshold:155 low than threshold:144 low than threshold:133 low than threshold:0 low than threshold:1 --------attack-------- low than threshold:133 low than threshold:0 low tha

Collection of Spectre-type, Meltdown-type and MDS-type PoCs

Collected from existing repos, this repo lists known Spectre-type, Meltdown-type and MDS-type PoCs PRs are welcome If you want to read corresponding codes, please checkout the branch codes git clone -b codes githubcom/morning21/Spectre_Meltdown_MDS_srcsgit ToC: 1 Collection 11 speed47/spectre-meltdown-checker 12 mniip/sp

MS Windows 10 cheat-sheet

Current status Project is looking for new maintainers, please see the Issue #22 About This was a cheat-sheet for a single-user installation of Windows 10 build 1909, also known as "19H2" Level 3 baseline with additional customizations: less network noise, focus on single-user workstation, etc If you are looking for something more of a *nix flavour, check-out the P

utility to make links to CVE detail sites

CVElinker $$\ $$\ $$\ $$ |\__| $$ | $$$$$$$\ $$\ $$\ $$$$$$\ $$ |$$\ $$$$$$$\ $$ | $$\ $$$$$$\ $$$$$$\ $$ _____|\$$\ $$ |$$ __$$\ $$ |$$ |$$ __$$\ $$ | $$ |$$ __$$\ $$ __$$\ $$ / \$$\$$ / $$$$$$$$ |$$ |$$ |$$ | $$ |$$$$$$ / $$$$$$$$ |$$ | \__| $$ | \$$$ / $$

Speculation control powershell script

Overview SpeculationControl is a PowerShell script that summarizes the state of configurable Windows mitigations for various speculative execution side channel vulnerabilities, such as CVE-2017-5715 (Spectre variant 2) and CVE-2017-5754 (Meltdown) For an explanation on how to interpret the output of this tool, please see Understanding Get-SpeculationControlSettings PowerShell

A collection of tips to harden your Windows computer and Chrome browser.

Windows and Chrome Hardening Introduction This document contains a collection of tips and scripts to harden your Windows computer and Chrome browser against attackers Unfortunately, both of these pieces of software need to be treated adversarially with a hardened security posture Any tips and well-composed content that people would like to add to this document v

linux-exploit

linux-exploit Exploits CVE-2018-3639 (as known as Speculative store bypass, Spectre Variant4) CVE-2017-5753 (as known as Bound check bypass, Spectre Variant1) Exploit remaining spectre gadget Find remaining spectre gadget, and exploit them Notes In the case of CVE-2018-3639, CVE-2017-5753, These are slightly updated version of Google's exploit code for eliminating ad

linux kernel exploits

linux-exploit Exploits CVE-2018-3639 (as known as Speculative store bypass, Spectre Variant4) CVE-2017-5753 (as known as Bound check bypass, Spectre Variant1) Exploit remaining spectre gadget Find remaining spectre gadget, and exploit them Notes In the case of CVE-2018-3639, CVE-2017-5753, These are slightly updated version of Google's exploit code for eliminating ad

spectre_meltdown Description Disable Spectre And Meltdown kernel patches (CVE-2017-5754, CVE-2017-5715, CVE-2018-3639) by adding "nopti", "spectre_v2=off" and "spec_store_bypass_disable=off" to kernel command line for grub Adds facts: meltdown spectre_v1 spectre_v2 ibpb_enabled ibrs_enabled pti_enabled cpu_microcode l1tf retp_enabled spec_store_

Recent Articles

Thought you'd addressed those data-leaking Spectre holes on Linux? Guess again. The patches aren't perfect
The Register • Thomas Claburn in San Francisco • 09 Jun 2020

Google engineer flags bugs in speculative-execution exploit defenses Meltdown The Sequel strikes Intel chips – and full mitigation against data-meddling LVI flaw will slash performance

Linux kernel developers are fixing up a trio of weaknesses in the open-source project – after a Google engineer reported that defenses implemented to stop speculative-execution snooping do not work as intended. In three posts marked urgent to the Linux kernel mailing list on Tuesday, Anthony Steinhauser points out problems with countermeasures put in place to block Spectre vulnerabilities in modern Intel and AMD x86 microprocessors that perform speculative execution. The Spectre family of flaw...

Thought you'd addressed those data-leaking Spectre holes on Linux? Guess again. The patches aren't perfect
The Register • Thomas Claburn in San Francisco • 09 Jun 2020

Google engineer flags bugs in speculative-execution exploit defenses Meltdown The Sequel strikes Intel chips – and full mitigation against data-meddling LVI flaw will slash performance

Linux kernel developers are fixing up a trio of weaknesses in the open-source project – after a Google engineer reported that defenses implemented to stop speculative-execution snooping do not work as intended. In three posts marked urgent to the Linux kernel mailing list on Tuesday, Anthony Steinhauser points out problems with countermeasures put in place to block Spectre vulnerabilities in modern Intel and AMD x86 microprocessors that perform speculative execution. The Spectre family of flaw...

Virus screener goes down, Intel patches more chips, Pegasus government spying code spreads across globe
The Register • Shaun Nichols in San Francisco • 22 Sep 2018

Plus: Gov pay sites take a dive, and more

Roundup When we weren't dealing with malware bricked-breweries, poorly-wiped servers or litigious vendors, we had a number of other security headaches to keep busy with. Here's a few of them. Government pay portals were in the crosshairs of cybercriminals this week. First, there was GovPayNow, who got the dreaded Brian Krebs treatment. The internet security sleuth reported that GovPayNow.com had been relieved by hackers of some 14m records. These include payment receipts for government fees and ...

Microsoft, Google: We've found a fourth data-leaking Meltdown-Spectre CPU hole
The Register • Chris Williams, Editor in Chief • 21 May 2018

Design blunder exists in Intel, AMD, Arm, Power processors Kernel-memory-leaking Intel processor design flaw forces Linux, Windows redesign We need to go deeper: Meltdown and Spectre flaws will force security further down the stack

A fourth variant of the data-leaking Meltdown-Spectre security flaws in modern processors has been found by Microsoft and Google researchers. These speculative-execution design blunders can be potentially exploited by malicious software running on a vulnerable device or computer, or a miscreant logged into the system, to slowly extract secrets, such as passwords, from protected kernel or application memory, depending on the circumstances. Variants 1 and 2 are known as Spectre (CVE-2017-5753, CVE...

References

CWE-203https://www.us-cert.gov/ncas/alerts/TA18-141Ahttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.htmlhttps://www.synology.com/support/security/Synology_SA_18_23https://www.kb.cert.org/vuls/id/180049https://usn.ubuntu.com/3655-2/https://usn.ubuntu.com/3654-2/https://usn.ubuntu.com/3654-1/https://usn.ubuntu.com/3653-2/https://usn.ubuntu.com/3653-1/https://usn.ubuntu.com/3652-1/https://usn.ubuntu.com/3651-1/https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannelhttps://support.citrix.com/article/CTX235225https://security.netapp.com/advisory/ntap-20180521-0001/https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerabilityhttps://bugs.chromium.org/p/project-zero/issues/detail?id=1528https://access.redhat.com/errata/RHSA-2018:1660https://access.redhat.com/errata/RHSA-2018:1655https://access.redhat.com/errata/RHSA-2018:1647https://access.redhat.com/errata/RHSA-2018:1630http://xenbits.xen.org/xsa/advisory-263.htmlhttp://www.securitytracker.com/id/1040949http://support.lenovo.com/us/en/solutions/LEN-22133https://access.redhat.com/errata/RHSA-2018:1690https://access.redhat.com/errata/RHSA-2018:1689https://access.redhat.com/errata/RHSA-2018:1688https://access.redhat.com/errata/RHSA-2018:1686https://access.redhat.com/errata/RHSA-2018:1676https://access.redhat.com/errata/RHSA-2018:1675https://access.redhat.com/errata/RHSA-2018:1674https://access.redhat.com/errata/RHSA-2018:1669https://access.redhat.com/errata/RHSA-2018:1668https://access.redhat.com/errata/RHSA-2018:1667https://access.redhat.com/errata/RHSA-2018:1666https://access.redhat.com/errata/RHSA-2018:1665https://access.redhat.com/errata/RHSA-2018:1664https://access.redhat.com/errata/RHSA-2018:1663https://access.redhat.com/errata/RHSA-2018:1662https://access.redhat.com/errata/RHSA-2018:1661https://access.redhat.com/errata/RHSA-2018:1659https://access.redhat.com/errata/RHSA-2018:1658https://access.redhat.com/errata/RHSA-2018:1657https://access.redhat.com/errata/RHSA-2018:1656https://access.redhat.com/errata/RHSA-2018:1654https://access.redhat.com/errata/RHSA-2018:1653https://access.redhat.com/errata/RHSA-2018:1652https://access.redhat.com/errata/RHSA-2018:1651https://access.redhat.com/errata/RHSA-2018:1650https://access.redhat.com/errata/RHSA-2018:1649https://access.redhat.com/errata/RHSA-2018:1648https://access.redhat.com/errata/RHSA-2018:1646https://access.redhat.com/errata/RHSA-2018:1645https://access.redhat.com/errata/RHSA-2018:1644https://access.redhat.com/errata/RHSA-2018:1643https://access.redhat.com/errata/RHSA-2018:1642https://access.redhat.com/errata/RHSA-2018:1636https://access.redhat.com/errata/RHSA-2018:1635https://access.redhat.com/errata/RHSA-2018:1633https://access.redhat.com/errata/RHSA-2018:1632https://access.redhat.com/errata/RHSA-2018:1629http://www.securityfocus.com/bid/104232https://www.exploit-db.com/exploits/44695/https://access.redhat.com/errata/RHSA-2018:1711https://access.redhat.com/errata/RHSA-2018:1710https://access.redhat.com/errata/RHSA-2018:1696https://www.debian.org/security/2018/dsa-4210https://usn.ubuntu.com/3655-1/https://access.redhat.com/errata/RHSA-2018:1738https://access.redhat.com/errata/RHSA-2018:1737https://access.redhat.com/errata/RHSA-2018:1641https://access.redhat.com/errata/RHSA-2018:1640https://access.redhat.com/errata/RHSA-2018:1639https://access.redhat.com/errata/RHSA-2018:1638https://access.redhat.com/errata/RHSA-2018:1637http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.htmlhttps://usn.ubuntu.com/3680-1/https://usn.ubuntu.com/3679-1/https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03850en_ushttps://access.redhat.com/errata/RHSA-2018:1826https://access.redhat.com/errata/RHSA-2018:1854https://access.redhat.com/errata/RHSA-2018:2006https://access.redhat.com/errata/RHSA-2018:2003https://access.redhat.com/errata/RHSA-2018:2001https://access.redhat.com/errata/RHSA-2018:1997https://access.redhat.com/errata/RHSA-2018:1967https://access.redhat.com/errata/RHSA-2018:1965https://access.redhat.com/errata/RHSA-2018:2060https://access.redhat.com/errata/RHSA-2018:2164https://access.redhat.com/errata/RHSA-2018:2162https://access.redhat.com/errata/RHSA-2018:2161https://access.redhat.com/errata/RHSA-2018:2172https://access.redhat.com/errata/RHSA-2018:2171https://access.redhat.com/errata/RHSA-2018:2216https://lists.debian.org/debian-lts-announce/2018/07/msg00020.htmlhttps://access.redhat.com/errata/RHSA-2018:2228https://access.redhat.com/errata/RHSA-2018:2250https://access.redhat.com/errata/RHSA-2018:2246https://access.redhat.com/errata/RHSA-2018:2258https://lists.debian.org/debian-lts-announce/2018/07/msg00038.htmlhttps://access.redhat.com/errata/RHSA-2018:2289https://access.redhat.com/errata/RHSA-2018:2328https://access.redhat.com/errata/RHSA-2018:2309https://access.redhat.com/errata/RHSA-2018:2364https://access.redhat.com/errata/RHSA-2018:2363https://access.redhat.com/errata/RHSA-2018:2396https://access.redhat.com/errata/RHSA-2018:2394https://access.redhat.com/errata/RHSA-2018:2387https://www.debian.org/security/2018/dsa-4273https://usn.ubuntu.com/3756-1/https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdfhttps://lists.debian.org/debian-lts-announce/2018/09/msg00017.htmlhttps://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004https://usn.ubuntu.com/3777-3/https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006https://access.redhat.com/errata/RHSA-2018:3425https://access.redhat.com/errata/RHSA-2018:3424https://access.redhat.com/errata/RHSA-2018:3423https://access.redhat.com/errata/RHSA-2018:3407https://access.redhat.com/errata/RHSA-2018:3402https://access.redhat.com/errata/RHSA-2018:3401https://access.redhat.com/errata/RHSA-2018:3400https://access.redhat.com/errata/RHSA-2018:3399https://access.redhat.com/errata/RHSA-2018:3398https://access.redhat.com/errata/RHSA-2018:3397https://access.redhat.com/errata/RHSA-2018:3396https://access.redhat.com/errata/RHSA-2018:2948http://www.securitytracker.com/id/1042004https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.htmlhttps://access.redhat.com/errata/RHSA-2019:0148https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdfhttps://lists.debian.org/debian-lts-announce/2019/03/msg00017.htmlhttps://lists.debian.org/debian-lts-announce/2019/03/msg00034.htmlhttps://lists.debian.org/debian-lts-announce/2019/04/msg00004.htmlhttps://nvidia.custhelp.com/app/answers/detail/a_id/4787https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.htmlhttps://access.redhat.com/errata/RHSA-2019:1046http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.htmlhttp://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.htmlhttps://seclists.org/bugtraq/2019/Jun/36https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdfhttp://www.openwall.com/lists/oss-security/2020/06/10/1http://www.openwall.com/lists/oss-security/2020/06/10/2http://www.openwall.com/lists/oss-security/2020/06/10/5https://www.oracle.com/security-alerts/cpujul2020.htmlhttp://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.htmlhttps://nvd.nist.govhttps://www.exploit-db.com/exploits/44695/https://usn.ubuntu.com/3655-2/https://www.kb.cert.org/vuls/id/180049