[XSA-320] Special Register Buffer speculative side channel
ISSUE DESCRIPTION
This issue is related to the MDS and TAA vulnerabilities. Please see
https://xenbits.xen.org/xsa/advisory-297.html (MDS) and
https://xenbits.xen.org/xsa/advisory-305.html (TAA) for details.
Certain processor operations microarchitecturally need to read data from
outside the physical core (e.g. to communicate with the random number
generator). In some implementations, this operation is called a Special
Register Read.
In some implementations, data are staged in a single shared buffer, and
a full cache line at a time is returned to the core which made the
Special Register Read. On parts vulnerable to MFBDS or TAA, an attacker
may be able to access stale data requested by other cores in the system.
For more details, see:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
https://software.intel.com/security-software-guidance/processors-affected-transient-execution-attack-mitigation-product-cpu-model
IMPACT
An attacker, which could include a malicious untrusted user process on a
trusted guest, or an untrusted guest, can sample the contents of
certain off-core accesses by other cores in the system.
This can include data whose use may depend on the secrecy of the value,
such as data from the Random Number Generator (e.g. RDRAND/RDSEED
instructions).
VULNERABLE SYSTEMS
Systems running all versions of Xen are affected.
Only x86 processors are vulnerable.
ARM processors are not believed to be vulnerable.
Only Intel based processors are affected. Processors from other
manufacturers (e.g. AMD) are not believed to be vulnerable.
Please consult the Intel Security Advisory for details on the affected
processors.
Package | Affected Version |
---|---|
pkg:generic/xen | = 4.9.x |
pkg:generic/xen | = 4.10.x |
pkg:generic/xen | = 4.11.x |
pkg:generic/xen | = 4.12.x |
pkg:generic/xen | = 4.13.x |
- ID
- XSA-320
- Severity
- medium
- Severity from
- CVE-2020-0543
- URL
- http://xenbits.xen.org/xsa/advisory-320.html
- Published
-
2020-06-09T16:33:00
(4 years ago) - Modified
-
2020-06-09T16:33:00
(4 years ago) - Rights
- Xen Project
- Other Advisories
-
- ALAS-2020-1396
- ALAS-2020-1401
- ALAS2-2020-1444
- ALAS2-2020-1465
- ALPINE:CVE-2020-0543
- ALSA-2021:3027
- ASA-202006-10
- DSA-4698-1
- DSA-4699-1
- DSA-4701-1
- ELSA-2020-2431
- ELSA-2020-2432
- ELSA-2020-2433
- ELSA-2020-5714
- ELSA-2020-5715
- ELSA-2020-5722
- ELSA-2020-5732
- ELSA-2020-5750
- ELSA-2020-5755
- ELSA-2020-5756
- ELSA-2021-3027
- ELSA-2021-3028
- FEDORA-2020-11ddbfbdf0
- FEDORA-2020-1afbe7ba2d
- FEDORA-2020-3364913ace
- FEDORA-2020-e47d28bc2b
- FEDORA-2020-e8835a5f8e
- FREEBSD:FBCBA194-AC7D-11EA-8B5E-B42E99A1B9C3
- openSUSE-SU-2020:0791-1
- openSUSE-SU-2020:0801-1
- openSUSE-SU-2020:0818-1
- openSUSE-SU-2020:0965-1
- openSUSE-SU-2020:0985-1
- openSUSE-SU-2021:0242-1
- RHSA-2020:2431
- RHSA-2020:2432
- RHSA-2020:2433
- RHSA-2021:3027
- RHSA-2021:3028
- SSA:2020-163-01
- SUSE-SU-2020:1587-1
- SUSE-SU-2020:1589-1
- SUSE-SU-2020:1595-1
- SUSE-SU-2020:1596-1
- SUSE-SU-2020:1597-1
- SUSE-SU-2020:1599-1
- SUSE-SU-2020:1600-1
- SUSE-SU-2020:1601-1
- SUSE-SU-2020:1602-1
- SUSE-SU-2020:1603-1
- SUSE-SU-2020:1604-1
- SUSE-SU-2020:1605-1
- SUSE-SU-2020:1609-1
- SUSE-SU-2020:1630-1
- SUSE-SU-2020:1632-1
- SUSE-SU-2020:1633-1
- SUSE-SU-2020:1634-1
- SUSE-SU-2020:1663-1
- SUSE-SU-2020:1887-1
- SUSE-SU-2020:1889-1
- SUSE-SU-2020:1902-1
- SUSE-SU-2020:2156-1
- SUSE-SU-2020:2478-1
- SUSE-SU-2020:2487-1
- SUSE-SU-2020:2822-1
- SUSE-SU-2021:1497-1
- USN-4385-1
- USN-4387-1
- USN-4388-1
- USN-4389-1
- USN-4390-1
- USN-4391-1
- USN-4392-1
- USN-4393-1
- USN-5617-1
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-320 | Security Advisory | http://xenbits.xen.org/xsa/advisory-320.html |
Xen Project | XSA-320 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-320.txt |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:generic/xen | xen | = 4.9.x | ||||
Affected | pkg:generic/xen | xen | = 4.10.x | ||||
Affected | pkg:generic/xen | xen | = 4.11.x | ||||
Affected | pkg:generic/xen | xen | = 4.12.x | ||||
Affected | pkg:generic/xen | xen | = 4.13.x |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |