Bug 1827165 (CVE-2020-0543)
Summary: | CVE-2020-0543 hw: Special Register Buffer Data Sampling (SRBDS) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | aarapov, abpalaci, acaringi, ailan, airlied, bhu, blc, bmasney, brdeoliv, bskeggs, ccui, cperry, crrobins, cvsbot-xmlrpc, dhoward, dominik.mierzejewski, drjones, dvlasenk, esammons, esyr, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, imammedo, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kcarcia, kernel-maint, kernel-mgr, knoel, labbott, lgoncalv, lilu, linville, masami256, matt, mchehab, mcressma, mikedep333, mjg59, mlangsdo, mrezanin, mstowell, nmurray, pbonzini, poros, ptalbert, qzhao, rt-maint, rvrbovsk, security-response-team, skozina, steved, vkuznets, williams, xen-maint |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A new domain bypass transient execution attack known as Special Register Buffer Data Sampling (SRBDS) has been found. This flaw allows data values from special internal registers to be leaked by an attacker able to execute code on any core of the CPU. An unprivileged, local attacker can use this flaw to infer values returned by affected instructions known to be commonly used during cryptographic operations that rely on uniqueness, secrecy, or both.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2020-06-09 23:20:31 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1827183, 1827184, 1827185, 1827186, 1827187, 1827188, 1827189, 1827190, 1827191, 1827192, 1827193, 1827195, 1827198, 1827199, 1840668, 1840669, 1840670, 1840671, 1840672, 1840673, 1840674, 1840675, 1840676, 1840677, 1840678, 1840679, 1840680, 1840681, 1840682, 1840683, 1840684, 1840685, 1840686, 1840687, 1840688, 1840691, 1845629, 1845630 | ||
Bug Blocks: | 1773845, 1829382 |
Description
Petr Matousek
2020-04-23 11:47:45 UTC
Mitigation: Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability. Statement: Red Hat Product Security is aware of this issue. Updates will be released as they become available. For additional information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/5142691 Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1845629] Created microcode_ctl tracking bugs for this issue: Affects: fedora-all [bug 1845630] This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2020:2431 https://access.redhat.com/errata/RHSA-2020:2431 This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2020:2433 https://access.redhat.com/errata/RHSA-2020:2433 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:2432 https://access.redhat.com/errata/RHSA-2020:2432 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-0543 External References: https://software.intel.com/security-software-guidance/insights/deep-dive-special-register-buffer-data-sampling https://blogs.intel.com/technology/2020/06/ipas-security-advisories-for-june-2020/#gs.6uyhri https://access.redhat.com/solutions/5142691 https://access.redhat.com/solutions/5142751 https://xenbits.xen.org/xsa/advisory-320.html This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2020:2677 https://access.redhat.com/errata/RHSA-2020:2677 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Via RHSA-2020:2679 https://access.redhat.com/errata/RHSA-2020:2679 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Red Hat Enterprise Linux 7.3 Update Services for SAP Solutions Red Hat Enterprise Linux 7.3 Telco Extended Update Support Via RHSA-2020:2680 https://access.redhat.com/errata/RHSA-2020:2680 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.5 Advanced Update Support Via RHSA-2020:2707 https://access.redhat.com/errata/RHSA-2020:2707 This issue has been addressed in the following products: Red Hat Enterprise Linux 6.6 Advanced Update Support Via RHSA-2020:2706 https://access.redhat.com/errata/RHSA-2020:2706 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.0 Update Services for SAP Solutions Via RHSA-2020:2757 https://access.redhat.com/errata/RHSA-2020:2757 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2020:2758 https://access.redhat.com/errata/RHSA-2020:2758 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2020:2771 https://access.redhat.com/errata/RHSA-2020:2771 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Extended Update Support Via RHSA-2020:2842 https://access.redhat.com/errata/RHSA-2020:2842 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:3027 https://access.redhat.com/errata/RHSA-2021:3027 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2021:3028 https://access.redhat.com/errata/RHSA-2021:3028 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.7 Extended Update Support Via RHSA-2021:3029 https://access.redhat.com/errata/RHSA-2021:3029 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Extended Update Support Via RHSA-2021:3176 https://access.redhat.com/errata/RHSA-2021:3176 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.4 Advanced Update Support Red Hat Enterprise Linux 7.4 Update Services for SAP Solutions Red Hat Enterprise Linux 7.4 Telco Extended Update Support Via RHSA-2021:3255 https://access.redhat.com/errata/RHSA-2021:3255 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.2 Advanced Update Support Via RHSA-2021:3323 https://access.redhat.com/errata/RHSA-2021:3323 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.3 Advanced Update Support Via RHSA-2021:3322 https://access.redhat.com/errata/RHSA-2021:3322 This issue has been addressed in the following products: Red Hat Enterprise Linux 7.6 Advanced Update Support Red Hat Enterprise Linux 7.6 Update Services for SAP Solutions Red Hat Enterprise Linux 7.6 Telco Extended Update Support Via RHSA-2021:3317 https://access.redhat.com/errata/RHSA-2021:3317 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2021:3364 https://access.redhat.com/errata/RHSA-2021:3364 |