Disclosed on Aug 14, 2018, multiple vulnerabilities were identified on CPUs which enables attacker to bypass security restrictions. This potentially allows unauthorized disclosure of information residing in L1 data cache of CPUs (aka L1 Terminal Fault, L1TF). This affects personal computers, servers and hypervisors running on a wide range of Intel CPUs.
Referring to disclosed details, there are three variants of L1TF (ref: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html)
The following Intel-based platforms are potentially impacted by these issues. Intel may modify this list at a later time.
Intel has worked with operating system vendors, equipment manufacturers, and other ecosystem partners to develop platform firmware and software updates that can help protect systems from these methods.
End users and systems administrators should check with their system manufacturers and system software vendors and apply any available updates as soon as practical.
Please note that:
|Vendor||Information to Note||Patches Status||Vendor Website|
|Operating System / Software|
Updated on: 16 Aug 2018
|cookielawinfo-checkbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checkbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|