Difference between revisions of "SVG:Speculative Execution Vulnerabilities"
Line 43: | Line 43: | ||
|- | |- | ||
| June 2018 || CVE-2018-3665 || || Lazy FP state restore || None || | | June 2018 || CVE-2018-3665 || || Lazy FP state restore || None || | ||
[https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html | [https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html] | ||
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html] | |||
[https://access.redhat.com/security/cve/cve-2018-3665 https://access.redhat.com/security/cve/cve-2018-3665 ] | [https://access.redhat.com/security/cve/cve-2018-3665 https://access.redhat.com/security/cve/cve-2018-3665 ] |
Revision as of 15:57, 13 September 2018
Main page | Software Security Checklist | Issue Handling | Advisories | Notes On Risk | Advisory Template | More |
Speculative Execution Vulnerabilities
This page is under construction. |
This provides information that may be useful to sites concerning the various speculative execution vulnerabilities concerning Intel chips and other processors.
See also EGI SVG Information on Meltdown and Spectre Vulnerabilities related advisory Advisory-SVG-CVE-2017-5753 which was compiled in January and early February 2018. (This may later be merged into this page.)
EGI SVG has at present (7th September 2018) issued 3 advisories related to Speculative Execution Vulnerabilities Advisory-SVG-CVE-2018-3620 in August 2018, Advisory-SVG-CVE-2018-3639 in May 2018, and Advisory-SVG-CVE-2017-5753 in January 2018.
Intel information https://www.intel.com/content/www/us/en/architecture-and-technology/facts-about-side-channel-analysis-and-intel-products.html
The important thing is that sites carry out recommended updates, including if appropriate their kernel versions. In some cases this may result in reduced performance, but the update should not be omitted because of this.
Date | CVE | Exploit Name | Public vulnerability name | EGI SVG Advisory | Comment/Other Links |
---|---|---|---|---|---|
January 2018 | CVE-2017-5753 | Spectre(Variant 1) | Bounds Check Bypass (BCB) | Advisory-SVG-CVE-2017-5753 | https://access.redhat.com/security/vulnerabilities/speculativeexecution |
January 2018 | CVE-2017-5715 | Spectre(Variant 2) | Branch Target Injection (BTI) | Advisory-SVG-CVE-2017-5753 | |
January 2018 | CVE-2017-5754 | Meltdown (Variant 3) | Rogue Data Cache Load (RDCL) | Advisory-SVG-CVE-2017-5753 | |
May 2018 | CVE-2018-3640 | SpectreNG(Variant 3a) | Rogue System Register Read (RSRE) | Advisory-SVG-CVE-2018-3639 | https://www.us-cert.gov/ncas/alerts/TA18-141A |
May 2018 | CVE-2018-3639 | SpectreNG(Variant 4) | Speculative Store Bypass (SSB) | Advisory-SVG-CVE-2018-3639 | https://access.redhat.com/security/vulnerabilities/ssbd |
May 2018 | CVE-2018-3693 | SpectreNG(Variant 1.1) | Bounds Check Bypass Store (BCBS) | None | |
June 2018 | CVE-2018-3665 | Lazy FP state restore | None |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html | |
August 2018 | CVE-2018-3620 | L1TF | OS, SMM related aspects | Advisory-SVG-CVE-2018-3620 |
https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html https://access.redhat.com/security/vulnerabilities/L1TF |
August 2018 | CVE-2018-3646 | L1TF | Virtualization related aspects | Advisory-SVG-CVE-2018-3620 | see links for CVE-2018-3620 |
August 2018 | CVE-2018-3615 | L1TF | SGX related aspects | Advisory-SVG-CVE-2018-3620 | RHEL 7 is not vulnerable but other Linux OS are |
This [ https://en.wikipedia.org/wiki/Spectre_(security_vulnerability) https://en.wikipedia.org/wiki/Spectre_(security_vulnerability)information provides some information on the variants, the recommended changes concern windows.