From 082725e73a601c67a850f9f83665642f21094653 Mon Sep 17 00:00:00 2001 From: Mark Felder Date: Thu, 21 Jun 2018 22:49:53 +0000 Subject: [PATCH] Document SA-18:07.lazyfpu --- security/vuxml/vuln.xml | 31 +++++++++++++++++++++++++++++++ 1 file changed, 31 insertions(+) diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index 3234701b726b..bdb7c37ee4b9 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,37 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> + + FreeBSD -- Lazy FPU State Restore Information Disclosure + + + FreeBSD-kernel + 11.111.1_11 + + + + +

Problem Description:

+

A subset of Intel processors can allow a local thread + to infer data from another thread through a speculative + execution side channel when Lazy FPU state restore is + used.

+

Impact:

+

Any local thread can potentially read FPU state information + from other threads running on the host. This could include + cryptographic keys when the AES-NI CPU feature is present.

+ +
+ + CVE-2018-3665 + SA-18:07.lazyfpu + + + 2018-06-21 + 2018-06-21 + +
+ GraphicsMagick -- multiple vulnerabilities