[kernel-sec-discuss] r793 - active ignored

Moritz Muehlenhoff jmm at alioth.debian.org
Tue May 1 00:16:10 UTC 2007


Author: jmm
Date: 2007-05-01 00:16:09 +0000 (Tue, 01 May 2007)
New Revision: 793

Added:
   ignored/CVE-2005-0109
Removed:
   active/CVE-2005-0109
Log:
move conceptual, theoretical hyperthreading issue to ignored


Deleted: active/CVE-2005-0109
===================================================================
--- active/CVE-2005-0109	2007-05-01 00:15:11 UTC (rev 792)
+++ active/CVE-2005-0109	2007-05-01 00:16:09 UTC (rev 793)
@@ -1,50 +0,0 @@
-Candidate: CVE-2005-0109
-References: 
- MISC:http://www.daemonology.net/papers/htt.pdf
- MISC:http://www.daemonology.net/hyperthreading-considered-harmful/
- MLIST:[openbsd-misc] 20050304 Re: FreeBSD hiding security stuff
- URL:http://marc.theaimsgroup.com/?l=openbsd-misc&m=110995101417256&w=2
- MLIST:[freebsd-security] 20050304 [Fwd: Re: FW:FreeBSD hiding security stuff]
- URL:http://marc.theaimsgroup.com/?l=freebsd-security&m=110994370429609&w=2
- MLIST:[freebsd-hackers] 20050304 Re: FW:FreeBSD hiding security stuff
- URL:http://marc.theaimsgroup.com/?l=freebsd-hackers&m=110994026421858&w=2
- MISC:http://www-1.ibm.com/support/docview.wss?uid=isg1SSRVHMCHMC_C081516_754
- FREEBSD:FreeBSD-SA-05:09
- SCO:SCOSA-2005.24
- URL:ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.24/SCOSA-2005.24.txt
- SUNALERT:101739
- URL:http://sunsolve.sun.com/search/document.do?assetkey=1-26-101739-1
- CERT-VN:VU#911878
- URL:http://www.kb.cert.org/vuls/id/911878
- BID:12724
- URL:http://www.securityfocus.com/bid/12724
- FRSIRT:ADV-2005-0540
- URL:http://www.frsirt.com/english/advisories/2005/0540
- FRSIRT:ADV-2005-3002
- URL:http://www.frsirt.com/english/advisories/2005/3002
- SECTRACK:1013967
- URL:http://securitytracker.com/id?1013967
- SECUNIA:15348
- URL:http://secunia.com/advisories/15348
- SECUNIA:18165
- URL:http://secunia.com/advisories/18165 
-Description: 
- Hyper-Threading technology, as used in FreeBSD and other operating systems
- that are run on Intel Pentium and other processors, allows local users to use
- a malicious thread to create covert channels, monitor the execution of other
- threads, and obtain sensitive information such as cryptographic keys, via a
- timing attack on memory cache misses.
-Notes: 
- There's no upstream patch, but Ubuntu has included a patch that disables
- HT by default, but allows users to turn it on again by booting w/ ht=on;
- included here in the patch-tracker.
- jmm> On linux-kernel nearly everyone disagreed that this a practical attack
- jmm> Plus, I remember some fixes for OpenSSL, that would render the attack
- jmm> impossible, so I think it might be wiser to fix this in OpenSSL?
- jmm> What did other distributions like Red Hat, SuSE or OWL do?
-Bugs: 
-upstream: 
-linux-2.6:
-2.6.8-sarge-security: ignored (2.6.8-16sarge5)
-2.4.27-sarge-security: ignored (2.4.27-10sarge5)
-2.6.18-etch-security: ignored

Copied: ignored/CVE-2005-0109 (from rev 790, active/CVE-2005-0109)




More information about the kernel-sec-discuss mailing list