[XSA-320] Special Register Buffer speculative side channel

Severity Medium
Affected Packages 5
CVEs 1

ISSUE DESCRIPTION

This issue is related to the MDS and TAA vulnerabilities. Please see
https://xenbits.xen.org/xsa/advisory-297.html (MDS) and
https://xenbits.xen.org/xsa/advisory-305.html (TAA) for details.

Certain processor operations microarchitecturally need to read data from
outside the physical core (e.g. to communicate with the random number
generator). In some implementations, this operation is called a Special
Register Read.

In some implementations, data are staged in a single shared buffer, and
a full cache line at a time is returned to the core which made the
Special Register Read. On parts vulnerable to MFBDS or TAA, an attacker
may be able to access stale data requested by other cores in the system.

For more details, see:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html
https://software.intel.com/security-software-guidance/processors-affected-transient-execution-attack-mitigation-product-cpu-model

IMPACT

An attacker, which could include a malicious untrusted user process on a
trusted guest, or an untrusted guest, can sample the contents of
certain off-core accesses by other cores in the system.

This can include data whose use may depend on the secrecy of the value,
such as data from the Random Number Generator (e.g. RDRAND/RDSEED
instructions).

VULNERABLE SYSTEMS

Systems running all versions of Xen are affected.

Only x86 processors are vulnerable.
ARM processors are not believed to be vulnerable.

Only Intel based processors are affected. Processors from other
manufacturers (e.g. AMD) are not believed to be vulnerable.

Please consult the Intel Security Advisory for details on the affected
processors.

Package Affected Version
pkg:generic/xen = 4.9.x
pkg:generic/xen = 4.10.x
pkg:generic/xen = 4.11.x
pkg:generic/xen = 4.12.x
pkg:generic/xen = 4.13.x
ID
XSA-320
Severity
medium
Severity from
CVE-2020-0543
URL
http://xenbits.xen.org/xsa/advisory-320.html
Published
2020-06-09T16:33:00
(4 years ago)
Modified
2020-06-09T16:33:00
(4 years ago)
Rights
Xen Project
Other Advisories
Source # ID Name URL
Xen Project XSA-320 Security Advisory http://xenbits.xen.org/xsa/advisory-320.html
Xen Project XSA-320 Signed Security Advisory http://xenbits.xen.org/xsa/advisory-320.txt
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:generic/xen xen = 4.9.x
Affected pkg:generic/xen xen = 4.10.x
Affected pkg:generic/xen xen = 4.11.x
Affected pkg:generic/xen xen = 4.12.x
Affected pkg:generic/xen xen = 4.13.x
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...