SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (UNIX)  >   Apple macOS/OS X Vendors:   Apple
(Apple Issues Fix for Apple macOS/OS X) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
SecurityTracker Alert ID:  1041236
SecurityTracker URL:  http://securitytracker.com/id/1041236
CVE Reference:   CVE-2018-3665   (Links to External Site)
Date:  Jul 10 2018
Impact:   Disclosure of system information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Intel Core-based processors. A local user can obtain potentially sensitive information. Apple macOS/OS X is affected.

A local user can conduct cache side-channel attacks to exploit a flaw in the 'Lazy Floating Point Unit (FPU)' scheme where the kernel saves and restores FPU state during task switching to potentially determine FPU state bits.

System software that utilize the Lazy FPU state restore method to delay the restoring of state until an instruction operating on that state is actually executed by the new process is affected.

Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival reported this vulnerability.

Impact:   A local user can obtain potentially sensitive FPU state information on the target system.
Solution:   The Apple has issued a fix for Apple macOS/OS X (macOS High Sierra 10.13.6, Security Update 2018-004 Sierra, Security Update 2018-004 El Capitan).

The Apple advisory is available at:

https://support.apple.com/en-us/HT208937

Vendor URL:  support.apple.com/en-us/HT208937 (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry is a follow-up to the message listed below.
Jun 14 2018 Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC