summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2018-3620
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2018-10-10 16:08:10 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2018-10-10 16:08:10 +0200
commite58840f1b07272348f16568187550f5c219ee2eb (patch)
treeb971c0cfbc0ac9ff0560015a7861cbb6560c73ae /retired/CVE-2018-3620
parent57b924820eb68766ff307bf9efd9f1d318dd0a34 (diff)
retire more issues
Diffstat (limited to 'retired/CVE-2018-3620')
-rw-r--r--retired/CVE-2018-362028
1 files changed, 28 insertions, 0 deletions
diff --git a/retired/CVE-2018-3620 b/retired/CVE-2018-3620
new file mode 100644
index 00000000..1cfc51bb
--- /dev/null
+++ b/retired/CVE-2018-3620
@@ -0,0 +1,28 @@
+Description: hw: cpu: L1 terminal fault (L1TF) [for attack vector against the operating system (Kernel)]
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=1585005
+ https://git.kernel.org/linus/958f338e96f874a0d29442396d6adf9c1e17aa2d
+ https://access.redhat.com/security/vulnerabilities/L1TF
+ https://foreshadowattack.eu/
+ https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
+ https://access.redhat.com/articles/3562741
+ https://xenbits.xen.org/xsa/advisory-273.html
+Notes:
+ carnil> Will be adressed in 4.18.1, 4.17.15, 4.14.63, 4.9.120, and 4.4.148.
+ bwh> Additional fixes needed:
+ bwh> 792adb90fa724 x86/init: fix build with CONFIG_SWAP=n
+ bwh> 56563f53d3066 x86/bugs: Move the l1tf function and define pr_fmt properly
+ bwh> 9df9516940a61 x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() ...
+ bwh> b0a182f875689 x86/speculation/l1tf: Fix off-by-one error when warning ...
+ bwh> f19f5c49bbc3f x86/speculation/l1tf: Exempt zeroed PTEs from inversion
+ bwh> 0768f91530ff4 x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert
+ bwh> 958f79b9ee55d x86/mm/pat: Make set_memory_np() L1TF safe
+ bwh> 1063711b57393 x86/mm/kmmio: Make the tracer robust against L1TF
+ bwh> 6a012288d6906 x86/speculation/l1tf: Suggest what to do on systems ...
+Bugs:
+upstream: released (4.19-rc1) [781fca5b104693bc9242199cc47c690dcaf6a4cb..07d981ad4cf1e78361c6db1c28ee5ba105f96cc1]
+4.9-upstream-stable: released (4.9.120) [329d815667373e858497b5947ad0484194d8c3e2..7f5d090ffe9e7603265e7991aacec64d86cf70ab]
+3.16-upstream-stable: released (3.16.59) [x86-speculation-l1tf-increase-32bit-pae-__physical_page_shift.patch, x86-speculation-l1tf-change-order-of-offset-type-in-swap-entry.patch, x86-speculation-l1tf-protect-swap-entries-against-l1tf.patch, x86-speculation-l1tf-protect-prot_none-ptes-against-speculation.patch, x86-speculation-l1tf-make-sure-the-first-page-is-always-reserved.patch, x86-speculation-l1tf-add-sysfs-reporting-for-l1tf.patch, x86-speculation-l1tf-disallow-non-privileged-high-mmio-prot_none.patch, x86-speculation-l1tf-limit-swap-file-size-to-max_pa-2.patch, x86-bugs-move-the-l1tf-function-and-define-pr_fmt-properly.patch, x86-speculation-l1tf-extend-64bit-swap-file-size-limit.patch, x86-speculation-l1tf-protect-pae-swap-entries-against-l1tf.patch, x86-speculation-l1tf-fix-up-pte-pfn-conversion-for-pae.patch, x86-speculation-l1tf-unbreak-__have_arch_pfn_modify_allowed.patch, x86-speculation-l1tf-invert-all-not-present-mappings.patch, x86-speculation-l1tf-protect-numa-balance-entries-against-l1tf.patch, x86-speculation-l1tf-make-pmd-pud_mknotpresent-invert.patch, x86-mm-pat-make-set_memory_np-l1tf-safe.patch, x86-mm-kmmio-make-the-tracer-robust-against-l1tf.patch]
+sid: released (4.17.15-1)
+4.9-stretch-security: released (4.9.110-3+deb9u3)
+3.16-jessie-security: released (3.16.59-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy