Lucene search

K
hpHP, HP Product Security Response Team (PSRT)HP:C06001626
HistoryMay 04, 2018 - 12:00 a.m.

HPSBHF03584 rev. 8 - Derivative Side-Channel Analysis Method

2018-05-0400:00:00
HP, HP Product Security Response Team (PSRT)
support.hp.com
21

0.003 Low

EPSS

Percentile

65.8%

Potential Security Impact

Unauthorized exposure of privileged data from memory.

Source: HP, HP Product Security Response Team (PSRT)

Reported By:

CVE-2018-3639: Google Project Zero (GPZ) Microsoft Security Response Center (MSRC)

CVE-2018-3640: Researchers from SYSGO AG and BiZone LLC

VULNERABILITY SUMMARY

Derivatives of speculative execution side-channel analysis methods publicly disclosed in January 2018 can be exploited to facilitate the unauthorized exposure of privileged data from memory.

More information is available at the following links:

RESOLUTION

HP is working with processor vendors for mitigation of this issue. This bulletin will be updated; check back frequently for updates to this section and other sections. HP is identifying affected platforms and target dates for Softpaqs. See the current list below.