[XSA-435] x86/Intel: Gather Data Sampling
ISSUE DESCRIPTION
A researcher has discovered Gather Data Sampling, a transient execution
side-channel whereby the AVX GATHER instructions can forward the content
of stale vector registers to dependent instructions.
The physical register file is a structure competitively shared between
sibling threads. Therefore an attacker can infer data from the sibling
thread, or from a more privileged context.
For more details, see:
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/gather-data-sampling.html
IMPACT
An attacker can infer data from different contexts on the same core.
Examples of such data includes key material, cipher and plaintext from
the AES-NI instructions, or the contents of REP-MOVS instructions,
commonly used to implement memcpy().
VULNERABLE SYSTEMS
Systems running all versions of Xen are affected.
See the Intel documentation for a list of affected processors.
CPUs from other hardware vendors are not believed to be affected.
- ID
- XSA-435
- Severity
- medium
- Severity from
- CVE-2022-40982
- URL
- http://xenbits.xen.org/xsa/advisory-435.html
- Published
-
2023-08-08T15:53:00
(13 months ago) - Modified
-
2023-08-08T15:53:00
(13 months ago) - Rights
- Xen Project
- Other Advisories
-
- ALAS2-2023-2195
- ALPINE:CVE-2022-40982
- ALSA-2023:7077
- DSA-5474-1
- DSA-5475-1
- ELSA-2023-12722
- ELSA-2023-12723
- ELSA-2023-12724
- ELSA-2023-12782
- ELSA-2023-12785
- ELSA-2023-12786
- ELSA-2023-12788
- ELSA-2023-6583
- ELSA-2023-7077
- ELSA-2023-7423
- FEDORA-2023-04473fc41e
- FEDORA-2023-10d34be85a
- FEDORA-2023-e1482687dd
- FEDORA-2023-fff31650c8
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7423
- RHSA-2023:7424
- SSA:2023-325-01
- SUSE-SU-2023:3289-1
- SUSE-SU-2023:3302-1
- SUSE-SU-2023:3309-1
- SUSE-SU-2023:3311-1
- SUSE-SU-2023:3313-1
- SUSE-SU-2023:3318-1
- SUSE-SU-2023:3324-1
- SUSE-SU-2023:3329-1
- SUSE-SU-2023:3333-1
- SUSE-SU-2023:3349-1
- SUSE-SU-2023:3359-1
- SUSE-SU-2023:3376-1
- SUSE-SU-2023:3377-1
- SUSE-SU-2023:3382-1
- SUSE-SU-2023:3383-1
- SUSE-SU-2023:3390-1
- SUSE-SU-2023:3391-1
- SUSE-SU-2023:3392-1
- SUSE-SU-2023:3395-1
- SUSE-SU-2023:3421-1
- SUSE-SU-2023:3446-1
- SUSE-SU-2023:3447-1
- SUSE-SU-2023:3494-1
- SUSE-SU-2023:3495-1
- SUSE-SU-2023:3496-1
- SUSE-SU-2023:3894-1
- SUSE-SU-2023:3895-1
- SUSE-SU-2023:3902-1
- USN-6286-1
- USN-6315-1
- USN-6316-1
- USN-6317-1
- USN-6318-1
- USN-6321-1
- USN-6324-1
- USN-6325-1
- USN-6328-1
- USN-6329-1
- USN-6330-1
- USN-6331-1
- USN-6332-1
- USN-6346-1
- USN-6348-1
- USN-6357-1
- USN-6388-1
- USN-6396-1
- USN-6396-2
- USN-6396-3
- USN-6397-1
Source | # ID | Name | URL |
---|---|---|---|
Xen Project | XSA-435 | Security Advisory | http://xenbits.xen.org/xsa/advisory-435.html |
Xen Project | XSA-435 | Signed Security Advisory | http://xenbits.xen.org/xsa/advisory-435.txt |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |