Linux Security
    Linux Security
    Linux Security

    Debian: DSA-4279-1: linux security update

    Date 20 Aug 2018
    4832
    Posted By Anthony Pell
    Multiple researchers have discovered a vulnerability in the way the Intel processor designs have implemented speculative execution of instructions in combination with handling of page-faults. This flaw could allow an attacker controlling an unprivileged process to read
    
    - -------------------------------------------------------------------------
    Debian Security Advisory DSA-4279-1                   This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                     Salvatore Bonaccorso
    August 20, 2018                       https://www.debian.org/security/faq
    - -------------------------------------------------------------------------
    
    Package        : linux
    CVE ID         : CVE-2018-3620 CVE-2018-3646
    
    Multiple researchers have discovered a vulnerability in the way the
    Intel processor designs have implemented speculative execution of
    instructions in combination with handling of page-faults. This flaw
    could allow an attacker controlling an unprivileged process to read
    memory from arbitrary (non-user controlled) addresses, including from
    the kernel and all other processes running on the system or cross
    guest/host boundaries to read host memory.
    
    To fully resolve these vulnerabilities it is also necessary to install
    updated CPU microcode (only available in Debian non-free). Common server
    class CPUs are covered in the update released as DSA 4273-1.
    
    For the stable distribution (stretch), these problems have been fixed in
    version 4.9.110-3+deb9u3.
    
    We recommend that you upgrade your linux packages.
    
    For the detailed security status of linux please refer to its security
    tracker page at:
    https://security-tracker.debian.org/tracker/linux
    
    Further information about Debian Security Advisories, how to apply
    these updates to your system and frequently asked questions can be
    found at: https://www.debian.org/security/
    
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    Advisories

    LinuxSecurity Poll

    No results found.

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.