Description
Hyper-Threading technology, as used in FreeBSD and other operating systems that are run on Intel Pentium and other processors, allows local users to use a malicious thread to create covert channels, monitor the execution of other threads, and obtain sensitive information such as cryptographic keys, via a timing attack on memory cache misses.
Product(s):
- FreeBSD 1.1.5.1
- FreeBSD 2.0.5
- FreeBSD 2.0
- FreeBSD 2.1.0
- FreeBSD 2.1.5
- FreeBSD 2.1.6.1
- FreeBSD 2.1.6
- FreeBSD 2.1.7.1
- FreeBSD 2.2.2
- FreeBSD 2.2.3
- FreeBSD 2.2.4
- FreeBSD 2.2.5
- FreeBSD 2.2.6
- FreeBSD 2.2.8
- FreeBSD 2.2
- FreeBSD 3.0
- FreeBSD 3.0 Releng
- FreeBSD 3.1
- FreeBSD 3.2
- FreeBSD 3.3
- FreeBSD 3.3 Release Candidate
- FreeBSD 3.4
- FreeBSD 3.5.1
- FreeBSD 3.5.1 Release
- FreeBSD 3.5.1 Stable
- FreeBSD 3.5
- FreeBSD 3.5 Stable
- FreeBSD 4.0
- FreeBSD 4.0 Alpha
- FreeBSD 4.0 Releng
- FreeBSD 4.1.1
- FreeBSD 4.1.1 Release
- FreeBSD 4.1.1 Stable
- FreeBSD 4.10
- FreeBSD 4.10 Patch 10
- FreeBSD 4.10 Patch 11
- FreeBSD 4.10 Patch 13
- FreeBSD 4.10 Patch 14
- FreeBSD 4.10 Patch 15
- FreeBSD 4.10 Patch 16
- FreeBSD 4.10 Patch 18
- FreeBSD 4.10 Patch 19
- FreeBSD 4.10 Patch 20
- FreeBSD 4.10 Patch 21
- FreeBSD 4.10 Patch 22
- FreeBSD 4.10 Patch 23
- FreeBSD 4.10 Patch 24
- FreeBSD 4.10 Patch 2
- FreeBSD 4.10 Patch 3
- FreeBSD 4.10 Patch 4
- FreeBSD 4.10 Patch 5
- FreeBSD 4.10 Patch 7
- FreeBSD 4.10 Patch 8
- FreeBSD 4.10 Patch 9
- FreeBSD 4.10 Release Candidate
- FreeBSD 4.10 Release
- FreeBSD 4.10 Release P8
- FreeBSD 4.10 Releng
- FreeBSD 4.11 Release P3
- FreeBSD 4.11 Releng
- FreeBSD 4.11 Stable
- FreeBSD 4.1
- FreeBSD 4.2
- FreeBSD 4.2 Stable
- FreeBSD 4.3
- FreeBSD 4.3 Patch 24
- FreeBSD 4.3 Patch 37
- FreeBSD 4.3 Patch 38
- FreeBSD 4.3 Patch 40
- FreeBSD 4.3 Patch 41
- FreeBSD 4.3 Patch 42
- FreeBSD 4.3 Release Candidate
- FreeBSD 4.3 Release
- FreeBSD 4.3 Release P38
- FreeBSD 4.3 Releng
- FreeBSD 4.3 Stable
- FreeBSD 4.4
- FreeBSD 4.4 Patch 27
- FreeBSD 4.4 Patch 41
- FreeBSD 4.4 Patch 42
- FreeBSD 4.4 Patch 44
- FreeBSD 4.4 Patch 45
- FreeBSD 4.4 Patch 46
- FreeBSD 4.4 Patch 47
- FreeBSD 4.4 Patch 4
- FreeBSD 4.4 Patch 8
- FreeBSD 4.4 Release P42
- FreeBSD 4.4 Releng
- FreeBSD 4.4 Stable
- FreeBSD 4.5
- FreeBSD 4.5 Patch 1
- FreeBSD 4.5 Patch 20
- FreeBSD 4.5 Patch 31
- FreeBSD 4.5 Patch 32
- FreeBSD 4.5 Patch 34
- +217 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-0109, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-0109 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.