Description: | Summary: The remote host is missing an update for the Huawei EulerOS 'kernel' package(s) announced via the EulerOS-SA-2018-1001 advisory.
Vulnerability Insight: The recent speculative execution CVEs address three potential attacks across a wide variety of architectures and hardware platforms.
Note: This issue is present in hardware and cannot be fully fixed via software update. The nature of these vulnerabilities and their fixes introduces the possibility of reduced performance on patched systems. The performance impact depends on the hardware and the applications in place.
The first two variants abuse speculative execution to perform bounds-check bypass (CVE-2017-5753), or by utilizing branch target injection (CVE-2017-5715) to cause kernel code at an address under attacker control to execute speculatively. Collectively these are known as 'Spectre'.
Variant CVE-2017-5715 fixes require CPU microcode to update.And advise to contact hardware vendors to receive the appropriate microcode for your processor.
The third variant (CVE-2017-5754) relies on the fact that, on impacted microprocessors, during speculative execution of instruction permission faults, exception generation triggered by a faulting access is suppressed until the retirement of the whole instruction block. Researchers have called this exploit 'Meltdown'.
Note: Upgrade and performance specifications, please see [link moved to references]
Affected Software/OS: 'kernel' package(s) on Huawei EulerOS V2.0SP2.
Solution: Please install the updated package(s).
CVSS Score: 4.7
CVSS Vector: AV:L/AC:M/Au:N/C:C/I:N/A:N
|