[XSA-273] L1 Terminal Fault speculative side channel
ISSUE DESCRIPTION
In x86 nomenclature, a Terminal Fault is a pagetable walk which aborts
due to the page being not present (e.g. paged out to disk), or because
of reserved bits being set.
Architecturally, such a memory access will result in a page fault
exception, but some processors will speculatively compute the physical
address and issue an L1D lookup. If data resides in the L1D cache, it
may be forwarded to dependent instructions, and may be leaked via a side
channel.
Furthermore:
* SGX protections are not applied
* EPT guest to host translations are not applied
* SMM protections are not applied
This issue is split into multiple CVEs depending on circumstance. The
CVEs which apply to Xen are:
* CVE-2018-3620 - Operating Systems and SMM
* CVE-2018-3646 - Hypervisors
For more details, see:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00161.html
IMPACT
An attacker can potentially read arbitrary host RAM. This includes data
belonging to Xen, data belonging to other guests, and data belonging to
different security contexts within the same guest.
An attacker could be a guest kernel (which can manipulate the pagetables
directly), or could be guest userspace either directly (e.g. with
mprotect() or similar system call) or indirectly (by gaming the guest
kernel's paging subsystem).
VULNERABLE SYSTEMS
Systems running all versions of Xen are affected.
Only x86 processors are vulnerable. ARM processors are not known to be
affected.
Only Intel Core based processors (from at least Merom onwards) are
potentially affected. Other processor designs (Intel Atom/Knights
range), and other manufacturers (AMD) are not known to be affected.
x86 PV guests fall into the CVE-2018-3620 (OS and SMM) category. x86
HVM and PVH guests fall into the CVE-2018-3646 (Hypervisors) category.
- ID
- XSA-273
- Severity
- medium
- Severity from
- CVE-2018-3620
- URL
- http://xenbits.xen.org/xsa/advisory-273.html
- Published
-
2018-08-14T17:15:00
(6 years ago) - Modified
-
2018-08-14T17:15:00
(6 years ago) - Rights
- Xen Project
- Other Advisories
-
- ALAS-2018-1058
- ALAS2-2018-1058
- ALPINE:CVE-2018-3620
- ALPINE:CVE-2018-3646
- CISCO-SA-20180814-CPUSIDECHANNEL
- DSA-4274-1
- DSA-4279-1
- ELSA-2018-2384
- ELSA-2018-2390
- ELSA-2018-4195
- ELSA-2018-4196
- ELSA-2018-4214
- ELSA-2018-4215
- ELSA-2018-4235
- FEDORA-2018-0edb45d9db
- FEDORA-2018-1621b2204a
- FEDORA-2018-1c80fea1cd
- FEDORA-2018-2ee3411cb8
- FEDORA-2018-3857a8b41a
- FEDORA-2018-59e4747e0f
- FEDORA-2018-683dfde81a
- FEDORA-2018-6e8c330d50
- FEDORA-2018-73dd8de892
- FEDORA-2018-79d7c3d2df
- FEDORA-2018-8422d94975
- FEDORA-2018-915602df63
- FEDORA-2018-94315e9a6b
- FEDORA-2018-9f4381d8c4
- FEDORA-2018-a0914af224
- FEDORA-2018-b68776e5b0
- FEDORA-2018-c0a1284064
- FEDORA-2018-d77cc41f35
- FEDORA-2018-ddbaca855e
- FEDORA-2018-e820fccd83
- FEDORA-2018-f20a0cead5
- FEDORA-2018-f8cba144ae
- FEDORA-2018-fe24359b69
- FEDORA-2019-16de0047d4
- FEDORA-2019-196ab64d65
- FEDORA-2019-1b986880ea
- FEDORA-2019-20a89ca9af
- FEDORA-2019-337484d88b
- FEDORA-2019-3da64f3e61
- FEDORA-2019-4002b91800
- FEDORA-2019-509c133845
- FEDORA-2019-65c6d11eba
- FEDORA-2019-7d3500d712
- FEDORA-2019-a6cd583a8d
- FEDORA-2019-bce6498890
- FEDORA-2019-c36afa818c
- FEDORA-2019-ce2933b003
- FREEBSD:2310B814-A652-11E8-805B-A4BADB2F4699
- GLSA-201810-06
- RHSA-2018:2384
- RHSA-2018:2390
- RHSA-2018:2395
- SSA:2018-240-01
- SUSE-SU-2018:2328-1
- SUSE-SU-2018:2331-1
- SUSE-SU-2018:2331-2
- SUSE-SU-2018:2332-1
- SUSE-SU-2018:2335-1
- SUSE-SU-2018:2338-1
- SUSE-SU-2018:2341-1
- SUSE-SU-2018:2342-1
- SUSE-SU-2018:2344-1
- SUSE-SU-2018:2344-2
- SUSE-SU-2018:2345-1
- SUSE-SU-2018:2346-1
- SUSE-SU-2018:2347-1
- SUSE-SU-2018:2348-1
- SUSE-SU-2018:2349-1
- SUSE-SU-2018:2350-1
- SUSE-SU-2018:2351-1
- SUSE-SU-2018:2352-1
- SUSE-SU-2018:2353-1
- SUSE-SU-2018:2354-1
- SUSE-SU-2018:2355-1
- SUSE-SU-2018:2356-1
- SUSE-SU-2018:2358-1
- SUSE-SU-2018:2359-1
- SUSE-SU-2018:2362-1
- SUSE-SU-2018:2363-1
- SUSE-SU-2018:2364-1
- SUSE-SU-2018:2366-1
- SUSE-SU-2018:2367-1
- SUSE-SU-2018:2368-1
- SUSE-SU-2018:2369-1
- SUSE-SU-2018:2374-1
- SUSE-SU-2018:2380-1
- SUSE-SU-2018:2381-1
- SUSE-SU-2018:2384-1
- SUSE-SU-2018:2387-1
- SUSE-SU-2018:2389-1
- SUSE-SU-2018:2391-1
- SUSE-SU-2018:2394-1
- SUSE-SU-2018:2401-1
- SUSE-SU-2018:2409-1
- SUSE-SU-2018:2410-1
- SUSE-SU-2018:2410-2
- SUSE-SU-2018:2413-1
- SUSE-SU-2018:2414-1
- SUSE-SU-2018:2416-1
- SUSE-SU-2018:2426-1
- SUSE-SU-2018:2450-1
- SUSE-SU-2018:2472-1
- SUSE-SU-2018:2473-1
- SUSE-SU-2018:2474-1
- SUSE-SU-2018:2480-1
- SUSE-SU-2018:2482-1
- SUSE-SU-2018:2483-1
- SUSE-SU-2018:2528-1
- SUSE-SU-2018:2596-1
- SUSE-SU-2018:2637-1
- SUSE-SU-2018:2963-1
- SUSE-SU-2018:3490-1
- SUSE-SU-2018:4300-1
- USN-3740-1
- USN-3740-2
- USN-3741-1
- USN-3741-2
- USN-3742-1
- USN-3742-2
- USN-3756-1
- USN-3823-1
- VU:982149
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-273 | Security Advisory | http://xenbits.xen.org/xsa/advisory-273.html |
Xen Project | XSA-273 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-273.txt |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |