Next revision
|
Previous revision
|
systems:meltdown-spectre [2018/01/11 07:53] eServices Greece created |
systems:meltdown-spectre [2018/03/05 05:31] (current) eServices Greece |
| {{tag>OS cve security}} |
| ====== CVE List ====== |
| * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5715|CVE-2017-5715]] |
| * Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. |
| * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5753|CVE-2017-5753]] |
| * Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. |
| * [[http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5754|CVE-2017-5754]] |
| * Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. |
| |
| ===== Microcode Updates ===== |
| Check how to apply Microcode [[systems:microcode|Microcode]] |
| ==== Intel ==== |
| [[https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File|Processor Microcode Data File]] |
| |
| ===== Check for Patches in Kernel ===== |
| <sxh bash> |
| dmesg | grep "cpu_insecure\|cpu_meltdown\|kaiser\|x86/pti" && echo "Patched " || echo "Unpatched" |
| </sxh> |
| |
====== List of Operating Systems ====== | ====== List of Operating Systems ====== |
^ OS ^ Distro ^ Release ^ Spectre Variant 1 ^ Spectre Variant 2 ^ Meltdown ^ Kernel ^ | ^ OS ^ Distro ^ Release ^ Spectre Variant 1 ^ Spectre Variant 2 ^ Meltdown ^ Kernel ^ |
| Linux | Centos | 6 | [[https://access.redhat.com/errata/RHSA-2018:0008|RHSA-2018:0008]], [[https://access.redhat.com/errata/RHSA-2018:0013|RHSA-2018:0013]], [[https://access.redhat.com/errata/RHSA-2018:0024|RHSA-2018:0024]] | N/A | [[https://access.redhat.com/errata/RHSA-2018:0008|RHSA-2018:0008]], [[https://access.redhat.com/errata/RHSA-2018:0013|RHSA-2018:0013]], [[https://access.redhat.com/errata/RHSA-2018:0024|RHSA-2018:0024]] | 2.6.32-696.18.7 | | | Linux | Centos | 6 | [[https://access.redhat.com/errata/RHSA-2018:0008|RHSA-2018:0008]], [[https://access.redhat.com/errata/RHSA-2018:0013|RHSA-2018:0013]], [[https://access.redhat.com/errata/RHSA-2018:0024|RHSA-2018:0024]] | N/A | [[https://access.redhat.com/errata/RHSA-2018:0008|RHSA-2018:0008]], [[https://access.redhat.com/errata/RHSA-2018:0013|RHSA-2018:0013]], [[https://access.redhat.com/errata/RHSA-2018:0024|RHSA-2018:0024]] | 2.6.32-696.18.7 | |
| Linux | Centos | 7 | [[https://www.centos.org/forums/viewtopic.php?f=51&t=65617|Forum]], [[https://bugzilla.redhat.com/show_bug.cgi?id=1519777|Bugzilla]] | N/A | [[https://www.centos.org/forums/viewtopic.php?f=51&t=65617|Forum]], [[https://bugzilla.redhat.com/show_bug.cgi?id=1519778|Bugzilla]] | 3.10.0-693.11.6 | | | Linux | Centos | 7 | [[https://www.centos.org/forums/viewtopic.php?f=51&t=65617|Forum]], [[https://bugzilla.redhat.com/show_bug.cgi?id=1519777|Bugzilla]] | N/A | [[https://www.centos.org/forums/viewtopic.php?f=51&t=65617|Forum]], [[https://bugzilla.redhat.com/show_bug.cgi?id=1519778|Bugzilla]] | 3.10.0-693.11.6 | |