SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   OpenBSD Kernel Vendors:   OpenBSD
(OpenBSD Issues Fix for OpenBSD Kernel) Linux Kernel 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
SecurityTracker Alert ID:  1041146
SecurityTracker URL:  http://securitytracker.com/id/1041146
CVE Reference:   CVE-2018-3665   (Links to External Site)
Date:  Jun 20 2018
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.3
Description:   A vulnerability was reported in the Linux kernel. A local user can obtain potentially sensitive information. OpenBSD Kernel is affected.

A local user can conduct cache side-channel attacks to exploit a flaw in the 'Lazy Floating Point Unit (FPU)' scheme where the kernel saves and restores FPU state during task switching to potentially determine FPU state bits.

Julian Stecklina (Amazon.de), Thomas Prescher (cyberus-technology.de), Zdenek Sojka (sysgo.com), and Colin Percival reported this vulnerability.

Impact:   A local user can obtain potentially sensitive FPU state information on the target system.
Solution:   OpenBSD has issued a source code fix for OpenBSD, available at:

https://ftp.openbsd.org/pub/OpenBSD/patches/6.3/common/010_intelfpu.patch.sig

The OpenBSD advisory is available at:

https://www.openbsd.org/errata63.html

Vendor URL:  www.openbsd.org/errata63.html (Links to External Site)
Cause:   Access control error

Message History:   This archive entry is a follow-up to the message listed below.
Jun 14 2018 Linux Kernel 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC