Ubuntu Security Notice USN-5617-1

Discussion in 'News Aggregator' started by Packet Storm, 20 Sep 2022.

  1. Packet Storm

    Packet Storm Guest

    Ubuntu Security Notice 5617-1 - It was discovered that memory contents previously stored in microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY read operations on Intel client and Xeon E3 processors may be briefly exposed to processes on the same or different processor cores. A local attacker could use this to expose sensitive information. Julien Grall discovered that Xen incorrectly handled memory barriers on ARM-based systems. An attacker could possibly use this issue to cause a denial of service, obtain sensitive information or escalate privileges.

    Continue reading...
     

Share This Page

Loading...