Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2018-12130 |
CWE-ID | CWE-200 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
IBM Systems Director Server applications / Other server solutions xen (Alpine package) Operating systems & Components / Operating system package or component |
Vendor |
IBM Corporation Alpine Linux Development Team |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU28396
Risk: Low
CVSSv4.0: 1.9 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2018-12130
CWE-ID:
CWE-200 - Exposure of sensitive information to an unauthorized actor
Exploit availability: No
DescriptionThe vulnerability allows a local authenticated user to gain access to sensitive information.
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
MitigationInstall update from vendor's website.
Vulnerable software versionsIBM Systems Director: 6.3.2.2
xen (Alpine package): 24.8-1
xen (Alpine package): 3.1.6.1-1
xen (Alpine package): 1.44-1 - 1.45-1
xen (Alpine package): 0.3.6.0amd12 - 1.12.9
xen (Alpine package): 1.9.9-3 - 1.9.10-1
xen (Alpine package): 0.16 - 0.35
xen (Alpine package): 0.2 - 0.9
xen (Alpine package): 0.4
xen (Alpine package): 2.5.3 - 2.17.5ubuntu1
xen (Alpine package): 3.4.0-1
xen (Alpine package): 0.14-1 - 0.15-2
xen (Alpine package): 2014.1-3
xen (Alpine package): 24.0-0ubuntu1
xen (Alpine package): 0.5.2-0ubuntu1 - 1.2.5ubuntu1daily13.06.14-0ubuntu1
xen (Alpine package): 3.0-0ubuntu1
xen (Alpine package): 1.5.2 - 1.6.2
xen (Alpine package): 0.1.8 - 1.0.75
xen (Alpine package): 1.20.0 - 2.18.2
xen (Alpine package): 20101020ubuntu323 - 20101020ubuntu468
xen (Alpine package): 0.2.12 - 1.5.49
xen (Alpine package): 1.8.8-2ubuntu1
xen (Alpine package): 0.2.8-8 - 0.2.11-1
xen (Alpine package): 0.3 - 1.8.42
xen (Alpine package): 5.3.28-3 - 5.3.28-4
xen (Alpine package): 1.5
xen (Alpine package): 0.4.5 - 0.5.8-2.2
xen (Alpine package): 0.2.11-1build1
xen (Alpine package): 0.63
xen (Alpine package): 0.3.1-0ubuntu1 - 0.10.0-3
xen (Alpine package): 0.13-1 - 0.22.1-2
xen (Alpine package): 2.1.0-2 - 2.1.26.dfsg1-14
xen (Alpine package): 0.5.16-3.5ubuntu1 - 0.5.17-6
xen (Alpine package): 1.3-1 - 1.3-3
xen (Alpine package): 5.11-1 - 7.35.0-1
xen (Alpine package): 1.3.9-17 - 2.0.3-2
xen (Alpine package): 0.1.2-1 - 0.2.6-1ubuntu1
xen (Alpine package): 1.0.47-2 - 1.0.64-0ubuntu1
xen (Alpine package): 2.1-3-dfsg-1 - 2.1-3-dfsg-2
xen (Alpine package): 0.100-3
xen (Alpine package): 2:1.0.6-2ubuntu7 - 2:1.6.4-1
xen (Alpine package): 0.8 - 9ubuntu2
xen (Alpine package): 3.0pl1-50 - 3.0pl1-119
xen (Alpine package): 1.0.0-0ubuntu1 - 1.0.0-0ubuntu2
xen (Alpine package): expression - 7.1.1-1
xen (Alpine package): 2.8.13-7 - 2.8.13-10
xen (Alpine package): 2.4.2-16 - 2.7-1
xen (Alpine package): 0.92-0ubuntu3 - 0.98-1
xen (Alpine package): 4.5.7-1 - 8.20-3ubuntu4
xen (Alpine package): 0.2.10-3 - 0.4.6-3
xen (Alpine package): 1.5 - 1.141
xen (Alpine package): 1:0.8.6-0ubuntu4 - 1:0.9.7.6-0ubuntu2
xen (Alpine package): 0.3ubuntu7 - 0.3ubuntu15.2
xen (Alpine package): 1.2.12-1ubuntu1 - 1.2.12-1
xen (Alpine package): 0.7-svn20050721 - 1.4.29-1
xen (Alpine package): 2.8.12.1-1.6 - 3.9.0-1
xen (Alpine package): 1.0.5-2 - 1.0.8-3
xen (Alpine package): 0.25-0ubuntu1 - 0.25-0ubuntu3
xen (Alpine package): 0.9-0ubuntu1 - 0.12-0ubuntu1
xen (Alpine package): 4.8.9
xen (Alpine package): 3.0.4
xen (Alpine package): 2.1.0
xen (Alpine package): 1.4.17
xen (Alpine package): 2.2.0b2
xen (Alpine package): r12.0 nil
xen (Alpine package): 3.0
xen (Alpine package):
xen (Alpine package): before 4.9.4-r1
CPE2.3https://git.alpinelinux.org/aports/commit/?id=e42bcd9d2c39e861c980adebf91418ddbe72bd21
https://git.alpinelinux.org/aports/commit/?id=c49084a961893d69e5cdba0b5a8072217ba8be67
https://git.alpinelinux.org/aports/commit/?id=9c1b7583516c05d0c924a44cbf3e3b651c58fa8e
https://git.alpinelinux.org/aports/commit/?id=a80b91506c3d39fd6d12fe94a65dd4a313261546
https://git.alpinelinux.org/aports/commit/?id=46c72db3ec91d42b57e2341cd9514a876b1b0952
https://git.alpinelinux.org/aports/commit/?id=49b770e54aaba339695f94b6940ff412732e4f8b
https://git.alpinelinux.org/aports/commit/?id=4cafe4f7ac5e95424824e1ef5835b409f1fe48e7
https://git.alpinelinux.org/aports/commit/?id=7fc5ca2a862219a65a85170d6e009147362ef8d8
https://git.alpinelinux.org/aports/commit/?id=1d0fe0196f9102c4c9edf2965deb91b142688924
https://git.alpinelinux.org/aports/commit/?id=0c47d89261a9f6f60cdd25fd3c7848e3d089f47a
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.