mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-19 00:13:33 +00:00
Document SA-18:07.lazyfpu
This commit is contained in:
parent
bad81ade76
commit
082725e73a
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=473007
@ -58,6 +58,37 @@ Notes:
|
||||
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
|
||||
-->
|
||||
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
|
||||
<vuln vid="4e07d94f-75a5-11e8-85d1-a4badb2f4699">
|
||||
<topic>FreeBSD -- Lazy FPU State Restore Information Disclosure</topic>
|
||||
<affects>
|
||||
<package>
|
||||
<name>FreeBSD-kernel</name>
|
||||
<range><ge>11.1</ge><lt>11.1_11</lt></range>
|
||||
</package>
|
||||
</affects>
|
||||
<description>
|
||||
<body xmlns="http://www.w3.org/1999/xhtml">
|
||||
<h1>Problem Description:</h1>
|
||||
<p>A subset of Intel processors can allow a local thread
|
||||
to infer data from another thread through a speculative
|
||||
execution side channel when Lazy FPU state restore is
|
||||
used.</p>
|
||||
<h1>Impact:</h1>
|
||||
<p>Any local thread can potentially read FPU state information
|
||||
from other threads running on the host. This could include
|
||||
cryptographic keys when the AES-NI CPU feature is present.</p>
|
||||
</body>
|
||||
</description>
|
||||
<references>
|
||||
<cvename>CVE-2018-3665</cvename>
|
||||
<freebsdsa>SA-18:07.lazyfpu</freebsdsa>
|
||||
</references>
|
||||
<dates>
|
||||
<discovery>2018-06-21</discovery>
|
||||
<entry>2018-06-21</entry>
|
||||
</dates>
|
||||
</vuln>
|
||||
|
||||
<vuln vid="25f73c47-68a8-4a30-9cbc-1ca5eea4d6ba">
|
||||
<topic>GraphicsMagick -- multiple vulnerabilities</topic>
|
||||
<affects>
|
||||
|
Loading…
Reference in New Issue
Block a user