SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


Try our Premium Alert Service
 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Device (Embedded Server/Appliance)  >   CPU (Generic) Vendors:   Intel
Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
SecurityTracker Alert ID:  1041125
SecurityTracker URL:  http://securitytracker.com/id/1041125
CVE Reference:   CVE-2018-3665   (Links to External Site)
Date:  Jun 14 2018
Impact:   Disclosure of system information
Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Intel Core-based processors. A local user can obtain potentially sensitive information.

A local user can conduct cache side-channel attacks to exploit a flaw in the 'Lazy Floating Point Unit (FPU)' scheme where the kernel saves and restores FPU state during task switching to potentially determine FPU state bits.

System software that utilize the Lazy FPU state restore method to delay the restoring of state until an instruction operating on that state is actually executed by the new process is affected.

Julian Stecklina from Amazon Germany, Thomas Prescher from Cyberus Technology GmbH (https://www.cyberus-technology.de/), Zdenek Sojka from SYSGO AG (http://sysgo.com), and Colin Percival reported this vulnerability.

Impact:   A local user can obtain potentially sensitive FPU state information on the target system.
Solution:   The vendor recommends that using 'Eager FP state restore' in lieu of 'Lazy FP state restore'.

Additional recommendations are provided in the vendor advisory.

The vendor advisory is available at:

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html

Vendor URL:  www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00145.html (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jun 14 2018 (Xen Issues Fix for Xen) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
Xen has issued a fix for Xen.
Jun 20 2018 (Citrix Issues Fix for Citrix XenServer) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
Citrix has issued a fix for Citrix XenServer.
Jun 21 2018 (FreeBSD Issues Fix) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
FreeBSD has issued a fix for FreeBSD 11.x.
Jul 10 2018 (Apple Issues Fix for Apple macOS/OS X) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
Apple has issued a fix for Apple macOS/OS X.
Aug 14 2018 (Microsoft Issues Fix for Microsoft Windows) Intel Core-based Processors 'Lazy FPU Restore' Lets Local Users Obtain Potentially Sensitive FPU State Information on the Target System
Microsoft has issued a fix for Microsoft Windows.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC