summaryrefslogtreecommitdiffstats
path: root/dsa-texts/4.9.210-1+deb9u1
diff options
context:
space:
mode:
authorBen Hutchings <ben@decadent.org.uk>2020-06-07 20:36:01 +0100
committerBen Hutchings <ben@decadent.org.uk>2020-06-07 20:36:01 +0100
commit507fd36689b5200e5d01ff5e1cda5f038ece3531 (patch)
tree90d0b4e53165978e3bcffafaffeb4b5f9a4b27bf /dsa-texts/4.9.210-1+deb9u1
parent260da640e862361cc6c78d244ca1676c2ffc5138 (diff)
dsa-texts: Fill in more issue descriptions
Diffstat (limited to 'dsa-texts/4.9.210-1+deb9u1')
-rw-r--r--dsa-texts/4.9.210-1+deb9u114
1 files changed, 13 insertions, 1 deletions
diff --git a/dsa-texts/4.9.210-1+deb9u1 b/dsa-texts/4.9.210-1+deb9u1
index a6c90658..3bb1e48f 100644
--- a/dsa-texts/4.9.210-1+deb9u1
+++ b/dsa-texts/4.9.210-1+deb9u1
@@ -68,7 +68,19 @@ CVE-2019-20811
CVE-2020-0543
- Description
+ Researchers at VU Amsterdam discovered that on some Intel x86
+ systems supporting the RDRAND and RDSEED instructions, speculative
+ execution may use part of a random value that was previously
+ generated for use on another core. Depending on how these
+ instructions are used by applications, a local user or VM guest
+ could use this to obtain sensitive information including
+ cryptographic keys from other users or VMs.
+
+ This vulnerability can be mitigated by a microcode update, either
+ as part of system firmware (BIOS) or through the intel-microcode
+ package in Debian's non-free archive section. This kernel update
+ only provides reporting of the vulnerability and the option to
+ disable the mitigation if it is not needed.
CVE-2020-2732

© 2014-2024 Faster IT GmbH | imprint | privacy policy