Alert.png The wiki is deprecated and due to be decommissioned by the end of September 2022.
The content is being migrated to other supports, new updates will be ignored and lost.
If needed you can get in touch with EGI SDIS team using operations @ egi.eu.

Difference between revisions of "SVG:Advisory-SVG-CVE-2018-3620"

From EGIWiki
Jump to navigation Jump to search
 
Line 3: Line 3:
<pre>
<pre>


Title:      EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk L1TF - Speculative Execution Side Channel vulnerabilities concerning Intel processors CVE-2018-3620, CVE-2018-3646 [EGI-SVG-CVE-2018-3620]   
Title:      EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk L1TF - Speculative Execution Side Channel  
            vulnerabilities concerning Intel processors CVE-2018-3620, CVE-2018-3646 [EGI-SVG-CVE-2018-3620]   


Date:        2018-09-04
Date:        2018-09-04
Line 16: Line 17:
CVE ID  : CVE-2018-3620, CVE-2018-3646  
CVE ID  : CVE-2018-3620, CVE-2018-3646  


Intel has issued an advisory INTEL-SA-00161 [R 1], concerning Speculative Execution side channel vulnerabilities concerning Intel processors known as the 'L1 Terminal Fault' (a.k.a. Foreshadow) [R 2].   
Intel has issued an advisory INTEL-SA-00161 [R 1], concerning Speculative Execution side channel  
RedHat has classed these as 'Important' [R 3], as they may allow an attacker to read unauthorized data from physical memory, and has issued updates which mitigate these vulnerabilities.  
vulnerabilities concerning Intel processors known as the 'L1 Terminal Fault' (a.k.a. Foreshadow) [R 2].   
RedHat has classed these as 'Important' [R 3], as they may allow an attacker to read unauthorized data  
from physical memory, and has issued updates which mitigate these vulnerabilities.  


Actions required/recommended
Actions required/recommended
============================
============================


Sites should update their linux systems if they have not done so already (since 14th August when mitigation for this issue via the various linux operating systems became available.) Sites should re-boot after installation of patches.  
Sites should update their linux systems if they have not done so already (since 14th August when mitigation  
for this issue via the various linux operating systems became available.) Sites should re-boot after  
installation of patches.  


Patches and re-boots are particularly important on machines where unprivileged users may have access e.g. worker nodes (WNs) and user interfaces (UIs) and on hypervisors.
Patches and re-boots are particularly important on machines where unprivileged users may have access  
e.g. worker nodes (WNs) and user interfaces (UIs) and on hypervisors.


Component installation information
Component installation information

Latest revision as of 09:57, 4 September 2018

Main page Software Security Checklist Issue Handling Advisories Notes On Risk Advisory Template More

Advisory-SVG-CVE-2018-3620



Title:       EGI SVG 'ADVISORY' [TLP:WHITE] HIGH risk L1TF - Speculative Execution Side Channel 
             vulnerabilities concerning Intel processors CVE-2018-3620, CVE-2018-3646 [EGI-SVG-CVE-2018-3620]  

Date:        2018-09-04
Updated:    

Affected software and risk
==========================

HIGH risk L1TF Speculative Execution Side Channel vulnerabilities concerning Intel processors

Package : Intel Processors
CVE ID  : CVE-2018-3620, CVE-2018-3646 

Intel has issued an advisory INTEL-SA-00161 [R 1], concerning Speculative Execution side channel 
vulnerabilities concerning Intel processors known as the 'L1 Terminal Fault' (a.k.a. Foreshadow) [R 2].  
RedHat has classed these as 'Important' [R 3], as they may allow an attacker to read unauthorized data 
from physical memory, and has issued updates which mitigate these vulnerabilities. 

Actions required/recommended
============================

Sites should update their linux systems if they have not done so already (since 14th August when mitigation 
for this issue via the various linux operating systems became available.) Sites should re-boot after 
installation of patches. 

Patches and re-boots are particularly important on machines where unprivileged users may have access 
e.g. worker nodes (WNs) and user interfaces (UIs) and on hypervisors.

Component installation information
==================================

For RedHat enterprise Linux see [R 4] 

For Scientific Linux see [R 5] 

For CentOS see [R 6] 

For Ubuntu see [R 7]

For Debian see [R 8] 


Mitigation
==========

Applying the updates mitigates these intel problems.

More information
================

In this latest kernel update RedHat also includes a mitigation for CVE-2018-3693, 
known as "Speculative Bounds Checks Bypass with Store (BCBS)"

Further note that updating to the latest kernel and microcode/firmware also remediates other 
vulnerabilities which were fixed in previous updates, including CVE-2018-3639, 
known as "Speculative Store Bypass" (SSB) or "Spectre Variant 4". But a full mitigation
 for that latter vulnerability requires also updating other packages, including among 
others libvirt and qemu-kvm, see [R 9] 
 
Note that the microcode as shipped by RHEL 7 is not vulnerable to CVE-2018-3615 
(also listed in the Intel advisory [R 1]), while for example Debian Stretch and Jessie 
(stable and old-stable) do have security patches [R 10].

SVG considers the likelihood of exploit of this vulnerability to be quite low, but the 
impact could be very high and very difficult to trace. 

SVG plans to put more information on the SVG wiki [R 11] alongside the Meltdown and Spectre vulnerabilities. 


TLP and URL
===========

** WHITE information - Unlimited distribution - 
   see https://wiki.egi.eu/wiki/EGI_CSIRT:TLP for distribution restrictions***                       

URL:   https://wiki.egi.eu/wiki/SVG:Advisory-SVG-CVE-2018-3620   

Minor updates may be made without re-distribution to the sites

Comments
========

Comments or questions should be sent to svg-rat at  mailman.egi.eu

If you find or become aware of another vulnerability which is relevant to EGI you may report it by e-mail to 

report-vulnerability at egi.eu
 
the EGI Software Vulnerability Group will take a look according to the procedure defined in [R 12]  

Note that this has been updated and the latest version approved by the Operations Management Board in November 2017


References
==========

[R 1] https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html

[R 2] https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html

[R 3] https://access.redhat.com/security/vulnerabilities/L1TF 

[R 4] https://access.redhat.com/security/cve/cve-2018-3620

[R 5] https://www.scientificlinux.org/

[R 6] https://lists.centos.org/pipermail/centos-announce/

[R 7] http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-3620.html

[R 8] https://security-tracker.debian.org/tracker/CVE-2018-3620

[R 9] https://access.redhat.com/security/vulnerabilities/ssbd

[R 10 ] https://security-tracker.debian.org/tracker/CVE-2018-3615

[R 11] https://wiki.egi.eu/wiki/SVG:SVG

[R 12] https://documents.egi.eu/public/ShowDocument?docid=3145

Credit
======

SVG was alerted to this vulnerability by Vincent Brillault who is a member of SVG 

Timeline  
========
Yyyy-mm-dd  [EGI-SVG-2018-CVE-2018-3620] 

2018-08-14 SVG alerted to this issue by Vincent Brillault 
2018-08-31 Advisory drafted
2018-09-04 Advisory sent to sites

Context
=======

This advisory has been prepared as part of the effort to fulfil EGI SVG's purpose 
"To minimize the risk to the EGI infrastructure arising from software vulnerabilities"

The risk is that assessed by the group, according to the EGI SVG issue handling procedure [R 12] 
in the context of how the software is used in the EGI infrastructure. It is the opinion of the group, 
we do not guarantee it to be correct. The risk may also be higher or lower in other deployments 
depending on how the software is used.   

Others may re-use this information provided they:-

1) Respect the provided TLP classification

2) Credit the EGI https://www.egi.eu/ Software Vulnerability Group


On behalf of the EGI SVG,