FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

FreeBSD -- Speculative Execution Vulnerabilities

Affected packages
11.1 <= FreeBSD-kernel < 11.1_8


VuXML ID 74daa370-2797-11e8-95ec-a4badb2f4699
Discovery 2018-03-14
Entry 2018-03-14

Problem Description:

A number of issues relating to speculative execution were found last year and publicly announced January 3rd. Two of these, known as Meltdown and Spectre V2, are addressed here.

CVE-2017-5754 (Meltdown) - ------------------------

This issue relies on an affected CPU speculatively executing instructions beyond a faulting instruction. When this happens, changes to architectural state are not committed, but observable changes may be left in micro- architectural state (for example, cache). This may be used to infer privileged data.

CVE-2017-5715 (Spectre V2) - --------------------------

Spectre V2 uses branch target injection to speculatively execute kernel code at an address under the control of an attacker.


An attacker may be able to read secret data from the kernel or from a process when executing untrusted code (for example, in a web browser).


CVE Name CVE-2017-5715
CVE Name CVE-2017-5754
FreeBSD Advisory SA-18:03.speculative_execution