CVE-2017-5715

NameCVE-2017-5715
DescriptionSystems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: local)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux (PTS)wheezy3.2.78-1vulnerable
wheezy (security)3.2.96-3vulnerable
jessie3.16.51-2vulnerable
jessie (security)3.16.51-3+deb8u1vulnerable
stretch4.9.65-3vulnerable
stretch (security)4.9.65-3+deb9u2vulnerable
buster, sid4.14.13-1vulnerable
virtualbox (PTS)jessie/contrib (security), jessie/contrib4.3.36-dfsg-1+deb8u1vulnerable
sid/contrib, buster/contrib5.2.6-dfsg-2fixed
wheezy, wheezy (security)4.1.42-dfsg-1+deb7u1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
linuxsource(unstable)(unfixed)medium
virtualboxsource(unstable)5.2.6-dfsg-1medium
virtualboxsourcejessie(unfixed)end-of-life
virtualboxsourcewheezy(unfixed)end-of-life

Notes

https://spectreattack.com/
https://xenbits.xen.org/xsa/advisory-254.html
https://googleprojectzero.blogspot.co.uk/2018/01/reading-privileged-memory-with-side.html
Paper: https://spectreattack.com/spectre.pdf
https://www.suse.com/de-de/support/kb/doc/?id=7022512
https://www.suse.com/support/update/announcement/2018/suse-su-20180009-1/
For the required microcode updates in advance:
intel-microcode: https://bugs.debian.org/886367
intel-microcode: Some microcode updates to partially adress CVE-2017-5715 included in 3.20171215.1
amd64-microcode: https://bugs.debian.org/886382
Qemu patches: https://lists.nongnu.org/archive/html/qemu-devel/2018-01/msg00811.html
to pass thorugh new MSR and CPUID flags from the host VM to the CPU, to
allow (future) enabling/disabling ranch prediction features in the Intel
CPU.
Qemu: https://bugs.debian.org/886532
[jessie] - virtualbox <end-of-life> (DSA-3699-1)
[wheezy] - virtualbox <end-of-life> (DSA 3454)

Search for package or bug name: Reporting problems