CVE-2018-3646

NameCVE-2018-3646
DescriptionSystems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1481-1, DSA-4274-1, DSA-4279-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
intel-microcode (PTS)jessie/non-free3.20180425.1~deb8u1vulnerable
stretch/non-free3.20190618.1~deb9u1fixed
buster/non-free3.20190618.1fixed
bullseye/non-free3.20191113.1fixed
sid/non-free3.20191115.1fixed
jessie/non-free (security)3.20190618.1~deb8u1fixed
stretch/non-free (security)3.20191112.1~deb9u1fixed
buster/non-free (security)3.20191112.1~deb10u1fixed
linux (PTS)jessie3.16.56-1+deb8u1vulnerable
jessie (security)3.16.76-1vulnerable
stretch4.9.189-3fixed
stretch (security)4.9.189-3+deb9u2fixed
buster4.19.67-2+deb10u1fixed
buster (security)4.19.67-2+deb10u2fixed
bullseye5.2.17-1fixed
sid5.3.9-2fixed
linux-4.9 (PTS)jessie (security)4.9.189-3+deb9u2~deb8u1fixed
xen (PTS)jessie4.4.1-9+deb8u10vulnerable
jessie (security)4.4.4lts5-0+deb8u1vulnerable
stretch, stretch (security)4.8.5+shim4.10.2+xsa282-1+deb9u11fixed
bullseye, buster, sid4.11.1+92-g6c33308a8d-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
intel-microcodesource(unstable)3.20180703.1
linuxsource(unstable)4.17.15-1
linuxsourcestretch4.9.110-3+deb9u3DSA-4279-1
linux-4.9sourcejessie4.9.110-3+deb9u4~deb8u1DLA-1481-1
xensource(unstable)4.11.1~pre.20180911.5acdd26fdc+dfsg-2
xensourcestretch4.8.4+xsa273+shim4.10.1+xsa273-1+deb9u10DSA-4274-1

Notes

[jessie] - linux <ignored> (Too invasive and risky to apply)
[jessie] - xen <ignored> (Depends on fix for CVE-2017-5715, CVE-2017-5753, CVE-2017-5754)
https://software.intel.com/security-software-guidance/software-guidance/l1-terminal-fault
https://foreshadowattack.eu/
https://git.kernel.org/linus/958f338e96f874a0d29442396d6adf9c1e17aa2d
https://xenbits.xen.org/xsa/advisory-273.html
Updates were already shipped with 20180703 release, but only disclosed later, see #906158
The 3.20180703.1 release for intel-microcode was the first batch of updates which targeted
most server type CPUs, additional models were supported in the 3.20180807a.1 release

Search for package or bug name: Reporting problems