diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2018-10-10 16:08:10 +0200 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2018-10-10 16:08:10 +0200 |
commit | e58840f1b07272348f16568187550f5c219ee2eb (patch) | |
tree | b971c0cfbc0ac9ff0560015a7861cbb6560c73ae /retired/CVE-2018-3620 | |
parent | 57b924820eb68766ff307bf9efd9f1d318dd0a34 (diff) |
retire more issues
Diffstat (limited to 'retired/CVE-2018-3620')
-rw-r--r-- | retired/CVE-2018-3620 | 28 |
1 files changed, 28 insertions, 0 deletions
diff --git a/retired/CVE-2018-3620 b/retired/CVE-2018-3620 new file mode 100644 index 00000000..1cfc51bb --- /dev/null +++ b/retired/CVE-2018-3620 @@ -0,0 +1,28 @@ +Description: hw: cpu: L1 terminal fault (L1TF) [for attack vector against the operating system (Kernel)] +References: + https://bugzilla.redhat.com/show_bug.cgi?id=1585005 + https://git.kernel.org/linus/958f338e96f874a0d29442396d6adf9c1e17aa2d + https://access.redhat.com/security/vulnerabilities/L1TF + https://foreshadowattack.eu/ + https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault + https://access.redhat.com/articles/3562741 + https://xenbits.xen.org/xsa/advisory-273.html +Notes: + carnil> Will be adressed in 4.18.1, 4.17.15, 4.14.63, 4.9.120, and 4.4.148. + bwh> Additional fixes needed: + bwh> 792adb90fa724 x86/init: fix build with CONFIG_SWAP=n + bwh> 56563f53d3066 x86/bugs: Move the l1tf function and define pr_fmt properly + bwh> 9df9516940a61 x86/speculation/l1tf: Fix overflow in l1tf_pfn_limit() ... + bwh> b0a182f875689 x86/speculation/l1tf: Fix off-by-one error when warning ... + bwh> f19f5c49bbc3f x86/speculation/l1tf: Exempt zeroed PTEs from inversion + bwh> 0768f91530ff4 x86/speculation/l1tf: Make pmd/pud_mknotpresent() invert + bwh> 958f79b9ee55d x86/mm/pat: Make set_memory_np() L1TF safe + bwh> 1063711b57393 x86/mm/kmmio: Make the tracer robust against L1TF + bwh> 6a012288d6906 x86/speculation/l1tf: Suggest what to do on systems ... +Bugs: +upstream: released (4.19-rc1) [781fca5b104693bc9242199cc47c690dcaf6a4cb..07d981ad4cf1e78361c6db1c28ee5ba105f96cc1] +4.9-upstream-stable: released (4.9.120) [329d815667373e858497b5947ad0484194d8c3e2..7f5d090ffe9e7603265e7991aacec64d86cf70ab] +3.16-upstream-stable: released (3.16.59) [x86-speculation-l1tf-increase-32bit-pae-__physical_page_shift.patch, x86-speculation-l1tf-change-order-of-offset-type-in-swap-entry.patch, x86-speculation-l1tf-protect-swap-entries-against-l1tf.patch, x86-speculation-l1tf-protect-prot_none-ptes-against-speculation.patch, x86-speculation-l1tf-make-sure-the-first-page-is-always-reserved.patch, x86-speculation-l1tf-add-sysfs-reporting-for-l1tf.patch, x86-speculation-l1tf-disallow-non-privileged-high-mmio-prot_none.patch, x86-speculation-l1tf-limit-swap-file-size-to-max_pa-2.patch, x86-bugs-move-the-l1tf-function-and-define-pr_fmt-properly.patch, x86-speculation-l1tf-extend-64bit-swap-file-size-limit.patch, x86-speculation-l1tf-protect-pae-swap-entries-against-l1tf.patch, x86-speculation-l1tf-fix-up-pte-pfn-conversion-for-pae.patch, x86-speculation-l1tf-unbreak-__have_arch_pfn_modify_allowed.patch, x86-speculation-l1tf-invert-all-not-present-mappings.patch, x86-speculation-l1tf-protect-numa-balance-entries-against-l1tf.patch, x86-speculation-l1tf-make-pmd-pud_mknotpresent-invert.patch, x86-mm-pat-make-set_memory_np-l1tf-safe.patch, x86-mm-kmmio-make-the-tracer-robust-against-l1tf.patch] +sid: released (4.17.15-1) +4.9-stretch-security: released (4.9.110-3+deb9u3) +3.16-jessie-security: released (3.16.59-1) |