Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Update for microcode_ctl RHSA-2018:0013-01
Summary:The remote host is missing an update for the 'microcode_ctl'; package(s) announced via the referenced advisory.
The remote host is missing an update for the 'microcode_ctl'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The microcode_ctl packages provide microcode
updates for Intel and AMD processors. Security Fix(es): * An industry-wide issue
was found in the way many modern microprocessor designs have implemented
speculative execution of instructions (a commonly used performance
optimization). There are three primary variants of the issue which differ in the
way the speculative execution can be exploited. Variant CVE-2017-5715 triggers
the speculative execution by utilizing branch target injection. It relies on the
presence of a precisely-defined instruction sequence in the privileged code as
well as the fact that memory accesses may cause allocation into the
microprocessor's data cache even for speculatively executed instructions that
never actually commit (retire). As a result, an unprivileged attacker could use
this flaw to cross the syscall and guest/host boundaries and read privileged
memory by conducting targeted cache side-channel attacks. (CVE-2017-5715) Note:
This is the microcode counterpart of the CVE-2017-5715 kernel mitigation. Red
Hat would like to thank Google Project Zero for reporting this issue.

Affected Software/OS:
microcode_ctl on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Please Install the Updated Packages.

CVSS Score:

CVSS Vector:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-5715
BugTraq ID: 102376
Bugtraq: 20190624 [SECURITY] [DSA 4469-1] libvirt security update (Google Search)
Bugtraq: 20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (Google Search)
CERT/CC vulnerability note: VU#180049
CERT/CC vulnerability note: VU#584653
Cisco Security Advisory: 20180104 CPU Side-Channel Information Disclosure Vulnerabilities
Debian Security Information: DSA-4120 (Google Search)
Debian Security Information: DSA-4187 (Google Search)
Debian Security Information: DSA-4188 (Google Search)
Debian Security Information: DSA-4213 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-19:26
RedHat Security Advisories: RHSA-2018:0292
SuSE Security Announcement: SUSE-SU-2018:0006 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0007 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0008 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0009 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0010 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0011 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0012 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0019 (Google Search)
SuSE Security Announcement: SUSE-SU-2018:0020 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0013 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0022 (Google Search)
SuSE Security Announcement: openSUSE-SU-2018:0023 (Google Search)
CopyrightCopyright (C) 2018 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.