[XSA-82] Guest triggerable AMD CPU erratum may cause host hang

Severity Medium
Affected Packages 3
CVEs 1

ISSUE DESCRIPTION

AMD CPU erratum 793 "Specific Combination of Writes to Write Combined
Memory Types and Locked Instructions May Cause Core Hang" describes a
situation under which a CPU core may hang.

IMPACT

A malicious guest administrator can mount a denial of service attack
affecting the whole system.

VULNERABLE SYSTEMS

The vulnerability is applicable only to family 16h model 00h-0fh AMD
CPUs.

Such CPUs running Xen versions 3.3 onwards are vulnerable. We have
not checked earlier versions of Xen.

HVM guests can always exploit the vulnerability if it is present.
PV guests can exploit the vulnerability only if they have been granted
access to physical device(s).

Non-AMD CPUs are not vulnerable.

CREDITS

This issue's security impact was discovered by Jan Beulich.

Package Affected Version
pkg:generic/xen = 4.1.x
pkg:generic/xen = 4.2.x
pkg:generic/xen = 4.3.x
Source # ID Name URL
Xen Project XSA-82 Security Advisory http://xenbits.xen.org/xsa/advisory-82.html
Xen Project XSA-82 Signed Security Advisory http://xenbits.xen.org/xsa/advisory-82.txt
Type Package URL Namespace Name / Product Version Distribution / Platform Arch Patch / Fix
Affected pkg:generic/xen xen = 4.1.x
Affected pkg:generic/xen xen = 4.2.x
Affected pkg:generic/xen xen = 4.3.x
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...