[XSA-263] Speculative Store Bypass

Severity Medium
Affected Packages 5
CVEs 1

ISSUE DESCRIPTION

Contemporary high performance processors may use a technique commonly
known as Memory Disambiguation, whereby speculative execution may
proceed past unresolved stores. This opens a speculative sidechannel in
which loads from an address which have had a recent store can observe
and operate on the older, stale, value.

For more details, see:
https://bugs.chromium.org/p/project-zero/issues/detail?id=1528
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html
https://www.amd.com/securityupdates

IMPACT

An attacker who can locate or create a suitable code gadget in a
different privilege context may be able to infer the content of
arbitrary memory accessible to that other privilege context.

At the time of writing, there are no known vulnerable gadgets in the
compiled hypervisor code. Xen has no interfaces which allow JIT code
to be provided. Therefore we believe that the hypervisor itself is
not vulnerable. Additionally, we do not think there is a viable
information leak by one Xen guest against another non-cooperating
guest.

However, in most configurations, within-guest information leak is
possible. Mitigation for this generally depends on guest changes (for
which you must consult your OS vendor) and on hypervisor support,
provided in this advisory.

VULNERABLE SYSTEMS

Systems running all versions of Xen are affected.

Processors from all vendors are affected to different extents.

Further communication will be made for Arm. See
https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability
for more details.

Package Affected Version
pkg:generic/xen = 4.6.x
pkg:generic/xen = 4.7.x
pkg:generic/xen = 4.8.x
pkg:generic/xen = 4.9.x
pkg:generic/xen = 4.10.x
ID
XSA-263
Severity
medium
Severity from
CVE-2018-3639
URL
http://xenbits.xen.org/xsa/advisory-263.html
Published
2018-05-21T16:52:00
(6 years ago)
Modified
2018-05-21T16:52:00
(6 years ago)
Rights
Xen Project
Other Advisories
Source # ID Name URL
Xen Project XSA-263 Security Advisory http://xenbits.xen.org/xsa/advisory-263.html
Xen Project XSA-263 Signed Security Advisory http://xenbits.xen.org/xsa/advisory-263.txt
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:generic/xen xen = 4.6.x
Affected pkg:generic/xen xen = 4.7.x
Affected pkg:generic/xen xen = 4.8.x
Affected pkg:generic/xen xen = 4.9.x
Affected pkg:generic/xen xen = 4.10.x
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...