[XSA-456] x86: Native Branch History Injection

CVEs 1

ISSUE DESCRIPTION

In August 2022, researchers at VU Amsterdam disclosed Spectre-BHB.

Spectre-BHB was discussed in XSA-398. At the time, the susceptibility
of Xen to Spectre-BHB was uncertain so no specific action was taken in
XSA-398. However, various changes were made thereafter in upstream Xen
as a consequence; more on these later.

VU Amsterdam have subsequently adjusted the attack to be pulled off
entirely from userspace, without the aid of a managed runtime in the
victim context.

For more details, see:
https://vusec.net/projects/native-bhi
https://vusec.net/projects/bhi-spectre-bhb
https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html
https://xenbits.xen.org/xsa/advisory-398.html

IMPACT

An attacker might be able to infer the contents of arbitrary host
memory, including memory assigned to other guests.

VULNERABLE SYSTEMS

Systems running all versions of Xen are affected.

Only Intel x86 CPUs are potentially affected. CPUs from other
manufacturers are not known to be affected.

A wide range of Intel CPUs employ Branch History prediction techniques.
However for older CPUs existing Spectre-v2 mitigations (XSA-254) are
believed to be sufficient to mitigate Native-BHI.

Therefore, the rest of the discussion will be limited in scope to the
CPUs for which a change in behaviour is expected. These are believed to
be all CPUs with eIBRS (Enhanced IBRS, a.k.a. IBRS_ALL or IBRS_ATT).
eIBRS signifies a hardware adjustment (mode-tagged indirect predictions)
designed to combat Spectre-v2, available in CPUs from 2019 onwards.

To determine if a system has eIBRS, run xen-cpuid -v in dom0, looking for
the string "eibrs" in the Dynamic Raw block of information. e.g.

# xen-cpuid -v
...
Dynamic sets:
Raw ...
...
[16] MSR_ARCH_CAPS.lo ... eibrs ...
...
...

Be aware that the Static sets are compile time information so will include the
string "eibrs" irrespective of hardware support. If there is no row for "[16]
MSR_ARCH_CAPS.lo" then the fixes for XSA-435 are missing.

Source # ID Name URL
Xen Project XSA-456 Security Advisory http://xenbits.xen.org/xsa/advisory-456.html
Xen Project XSA-456 Signed Security Advisory http://xenbits.xen.org/xsa/advisory-456.txt
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...