公告ID: KYLIN-2020-0543
安全等级: 中等
产品: Kylin V3
发布日期: 2020年6月9日
CVE: CVE-2020-0543
CVSS3评分: 6.5
概述:
Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691 描述:
A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both. 系统版本:
KYLIN 3.0.x
KYLIN 3.0.x
KYLIN 3.0.x
KYLIN 3.2.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.4.x
KYLIN 3.4.x
KYLIN 3.2.x
KYLIN 3.3.x
KYLIN 3.4.x
受影响包列表:
kernel
kernel-xen
microcode_ctl
kernel
kernel
kernel-alt
kernel-rt
kernel
kernel-rt
microcode_ctl-2:1.17-33.26.el6_10
microcode_ctl-2:2.1-61.6.el7_8
microcode_ctl-4:20191115-4.20200602.2.el8_2