Bug 1791288 - xen: arm: a CPU may speculate past the ERET instruction which could lead to host memory read
Summary: xen: arm: a CPU may speculate past the ERET instruction which could lead to h...
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1791289
Blocks: 1791291
TreeView+ depends on / blocked
 
Reported: 2020-01-15 13:15 UTC by Marian Rehak
Modified: 2020-08-24 16:10 UTC (History)
24 users (show)

Fixed In Version:
Doc Type: No Doc Update
Doc Text:
Clone Of:
Environment:
Last Closed: 2020-04-22 04:32:24 UTC
Embargoed:


Attachments (Terms of Use)

Description Marian Rehak 2020-01-15 13:15:27 UTC
Some CPUs can speculate past an ERET instruction and potentially perform speculative accesses to memory before processing the exception return. Since the register state is often controlled by lower privilege level (i.e guest kernel/userspace) at the point of the ERET, this could potentially be used as part of a side-channel attack.

Upstream Advisory:

https://xenbits.xen.org/xsa/advisory-312.html

Comment 1 Marian Rehak 2020-01-15 13:15:48 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1791289]


Note You need to log in before you can comment on or make changes to this bug.