Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1561794 - (CVE-2018-9056) CVE-2018-9056 hw: cpu: speculative execution branch predictor side-channel attack
CVE-2018-9056 hw: cpu: speculative execution branch predictor side-channel at...
Status: CLOSED CANTFIX
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20180328,repor...
: Reopened, Security
Depends On:
Blocks: 1561040
  Show dependency treegraph
 
Reported: 2018-03-28 19:42 EDT by Sam Fowler
Modified: 2018-04-18 02:08 EDT (History)
48 users (show)

See Also:
Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
BranchScope is a new class of attack which leverages functioning of the Branch Prediction Unit (BPU) of a processor to infer/leak sensitive process information, which is involved in the branch decision making (if (x) { x ^ y; } else {x & y;}). In this, BranchScope side-channel could help to infer 'x', by observing prediction patterns of the Branch Prediction Unit (BPU).
Story Points: ---
Clone Of:
Environment:
Last Closed: 2018-04-18 02:08:29 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Sam Fowler 2018-03-28 19:42:39 EDT
BranchScope is a new class of attack which leverages functioning of the Branch Prediction Unit (BPU) of a processor to infer/leak sensitive process information, which is involved in the branch decision making. ex. if (x) { x ^ y; } else {x & y;}. In this, BranchScope side-channel could help to infer 'x', by observing prediction patterns of the Branch Prediction Unit(BPU). This is a h/w processor issue; Not really a Linux kernel one. It is specific to a target software which uses sensitive information in branching expressions. A software mitigation could be for target software to avoid use of sensitive data bits in (if..else) branching decisions or to avoid (if..else) branching altogether. It could not be fixed generically in the Linux kernel for all applications.

External References:

http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf
https://arstechnica.com/gadgets/2018/03/its-not-just-spectre-researchers-reveal-more-branch-prediction-attacks/
Comment 1 Prasad J Pandit 2018-04-05 07:25:45 EDT
BranchScope isn't a kernel issue. It presents a new side-channel attack vector to infer/leak sensitive information from a process. There are numerous side-channels which can be used to leak sensitive information(ex. cryptographic keys). Ex. Cache-timing, Flush-reload, Branch Prediction side channel et. el. There are also instances wherein acoustic sounds produced during cryptographic operations or power consumption patterns of a machine performing such operations have been studied to leak/infer sensitive information. BranchScope is yet another method.

Countermeasure against BranchScope side channel is for software to avoid branching(if..else) instructions. And any changes/tweaks that can be made into hardware function which is leveraged to infer/leak sensitive data bits. In BranchScope's case that would Branch Prediction Unit(BPU).

It is not something to be fixed in the kernel.
Comment 4 Eric Christensen 2018-04-09 16:59:49 EDT
Mitigation:

This is a hardware processor issue, not a Linux kernel flaw. The flaw specifically targets software which uses sensitive information in branching expressions. A software mitigation could be for the target software to avoid the use of sensitive data bits in (if..else) branching decisions or to avoid (if..else) branching altogether.

Note You need to log in before you can comment on or make changes to this bug.