The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Vulnerability of Intel processors: information disclosure via SMT/Hyper-Threading PortSmash

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via SMT/Hyper-Threading PortSmash on an Intel processor, in order to obtain sensitive information.
Severity of this announce: 1/4.
Creation date: 05/11/2018.
Références of this computer vulnerability: 530514, bulletinjan2019, CERTFR-2019-AVI-242, cpuapr2019, cpujan2019, cpujul2019, CVE-2018-5407, DSA-2018-030, DSA-4348-1, DSA-4355-1, ibm10794537, K49711130, openSUSE-SU-2018:4050-1, openSUSE-SU-2018:4104-1, openSUSE-SU-2019:0088-1, openSUSE-SU-2019:0234-1, RHSA-2019:2125-01, SUSE-SU-2018:3964-1, SUSE-SU-2018:3989-1, SUSE-SU-2018:4001-1, SUSE-SU-2018:4068-1, SUSE-SU-2018:4274-1, SUSE-SU-2019:0117-1, SUSE-SU-2019:0395-1, SUSE-SU-2019:1553-1, USN-3840-1, VIGILANCE-VUL-27667.

Description of the vulnerability

An attacker can bypass access restrictions to data via SMT/Hyper-Threading PortSmash on an Intel processor, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

This computer vulnerability alert impacts software or systems such as Debian, Avamar, BIG-IP Hardware, TMOS, AIX, IRAD, MariaDB ~ precise, Windows (platform) ~ not comprehensive, MySQL Community, MySQL Enterprise, OpenBSD, OpenSSL, openSUSE Leap, Oracle Communications, Oracle Fusion Middleware, Oracle Identity Management, Solaris, Tuxedo, WebLogic, Percona Server, XtraBackup, RHEL, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu, Unix (platform) ~ not comprehensive.

Our Vigil@nce team determined that the severity of this computer threat alert is low.

The trust level is of type confirmed by the editor, with an origin of user shell.

A proof of concept or an attack tool is available, so your teams have to process this alert. An attacker with a technician ability can exploit this security vulnerability.

Solutions for this threat

Intel processors: workaround for SMT/Hyper-Threading PortSmash.
A workaround is to disable Hyper-Threading in the BIOS.

AIX: patch for OpenSSL.
A patch is available:
  https://aix.software.ibm.com/aix/efixes/security/openssl_fix29.tar

Cloud Foundry: fixed versions for OpenSSL.
Fixed versions are indicated in information sources.

Debian 9: new openssl1.0 packages.
New packages are available:
  Debian 9: openssl1.0 1.0.2q-1~deb9u1

Debian 9: new openssl packages.
New packages are available:
  Debian 9: openssl 1.1.0j-1~deb9u1

EMC Avamar: solution for Multiprocessor Side-Channel.
The solution is indicated in information sources.

F5 BIG-IP: solution for PortSmash.
The solution is indicated in information sources.

IBM Rational Application Developer for WebSphere: solution for Node.js.
The solution is indicated in information sources.

MariaDB: version 5.5.63.
The version 5.5.63 is fixed:
  https://mariadb.com/downloads/

MySQL: version 5.6.44.
The version 5.6.44 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 5.7.26.
The version 5.7.26 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

MySQL: version 8.0.16.
The version 8.0.16 is fixed:
  https://support.oracle.com/rs?type=doc&id=2522850.1
  https://www.mysql.com/fr/

OpenBSD: solution for SMT/Hyper-Threading PortSmash.
A patch is available:
  https://ftp.openbsd.org/pub/OpenBSD/patches/6.4/common/003_portsmash.patch.sig

OpenSSL: version 1.1.0i.
The version 1.1.0i is fixed:
  https://www.openssl.org/source/

openSUSE Leap 15.0: new openssl-1_0_0 packages.
New packages are available:
  openSUSE Leap 15.0: openssl-1_0_0 1.0.2p-lp150.2.9.1

openSUSE Leap 42.3: new compat-openssl098 packages.
New packages are available:
  openSUSE Leap 42.3: compat-openssl098 0.9.8j-27.1

openSUSE Leap 42.3: new nodejs4 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs4 4.9.1-20.1

openSUSE Leap 42.3: new nodejs6 packages.
New packages are available:
  openSUSE Leap 42.3: nodejs6 6.16.0-18.1

Oracle Communications: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2559239.1
  https://support.oracle.com/rs?type=doc&id=2563691.1
  https://support.oracle.com/rs?type=doc&id=2559240.1
  https://support.oracle.com/rs?type=doc&id=2559722.1
  https://support.oracle.com/rs?type=doc&id=2559225.1
  https://support.oracle.com/rs?type=doc&id=2559721.1
  https://support.oracle.com/rs?type=doc&id=2559256.1
  https://support.oracle.com/rs?type=doc&id=2559242.1
  https://support.oracle.com/rs?type=doc&id=2559243.1
  https://support.oracle.com/rs?type=doc&id=2559648.1

Oracle Fusion Middleware: CPU of April 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2498664.1

Oracle Fusion Middleware: CPU of July 2019.
A Critical Patch Update is available:
  https://support.oracle.com/rs?type=doc&id=2534806.1

Oracle MySQL: version 5.6.43.
The version 5.6.43 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 5.7.25.
The version 5.7.25 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle MySQL: version 8.0.14.
The version 8.0.14 is fixed:
  https://support.oracle.com/rs?type=doc&id=2487644.1
  https://www.mysql.com/fr/

Oracle Solaris: patch for third party software of January 2019 v1.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

Percona Server for MySQL: version 5.7.25-28.
The version 5.7.25-28 is fixed:
  https://www.percona.com/

Percona Server: version 5.7.26-29.
The version 5.7.26-29 is fixed:
  https://www.percona.com/

Percona XtraDB Cluster: version 5.7.26-31.37.
The version 5.7.26-31.37 is fixed:
  https://www.percona.com/

RHEL 7: new ovmf packages.
New packages are available:
  RHEL 7: ovmf 20180508-6.gitee3198e672e2.el7

SUSE LE 11: new openssl packages.
New packages are available:
  SUSE LE 11 SP3: openssl 0.9.8j-0.106.18.1
  SUSE LE 11 SP4: openssl 0.9.8j-0.106.18.1

SUSE LE 11 SP3: new openssl1 packages.
New packages are available:
  SUSE LE 11 SP3: openssl1 1.0.1g-0.58.15.1

SUSE LE 12: new nodejs4 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs4 4.9.1-15.17.1

SUSE LE 12: new nodejs6 packages.
New packages are available:
  SUSE LE 12 RTM-SP4: nodejs6 6.16.0-11.21.1

SUSE LE 12 RTM: new openssl packages (19/06/2019).
New packages are available:
  SUSE LE 12 RTM: openssl 1.0.1i-27.34.1

SUSE LE 12 SP3/4: new compat-openssl098 packages.
New packages are available:
  SUSE LE 12 SP3: compat-openssl098 0.9.8j-106.9.1
  SUSE LE 12 SP4: compat-openssl098 0.9.8j-106.9.1

SUSE LE 12 SP4: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 12 SP4: openssl-1_0_0 1.0.2p-3.3.1

SUSE LE 15: new openssl-1_0_0 packages.
New packages are available:
  SUSE LE 15 RTM: openssl-1_0_0 1.0.2p-3.11.1

Synology DSM: version 6.2.2-24922.
The version 6.2.2-24922 is fixed.

Synology DS/RS: version 6.2.2-24922.
The version 6.2.2-24922 is fixed:
  https://www.synology.com/

Ubuntu: new libssl packages.
New packages are available:
  Ubuntu 18.10: libssl1.0.0 1.0.2n-1ubuntu6.1, libssl1.1 1.1.1-1ubuntu2.1
  Ubuntu 18.04 LTS: libssl1.0.0 1.0.2n-1ubuntu5.2, libssl1.1 1.1.0g-2ubuntu4.3
  Ubuntu 16.04 LTS: libssl1.0.0 1.0.2g-1ubuntu4.14
  Ubuntu 14.04 LTS: libssl1.0.0 1.0.1f-1ubuntu2.27

Wind River Linux: solution for SMT/Hyper-Threading PortSmash.
The solution is indicated in information sources.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides systems vulnerabilities patches. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.