Bug 2114996 (CVE-2021-46778) - CVE-2021-46778 hw: cpu: AMD: Execution Unit Scheduler Contention Side-Channel vulnerability
Summary: CVE-2021-46778 hw: cpu: AMD: Execution Unit Scheduler Contention Side-Channel...
Keywords:
Status: NEW
Alias: CVE-2021-46778
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2115011 2115013 2115014 2115015 2115017 2115018 2115046 2115047 2115048 2115049 2115051 2115053 2115054 2115055 2115056 2115057 2115058 2115059 2115060 2115061 2117012 2210748 2210749 2210750 2210751 2210752 2210753 2210754 2210755
Blocks: 2114988
TreeView+ depends on / blocked
 
Reported: 2022-08-03 16:48 UTC by Rohit Keshri
Modified: 2025-11-01 08:27 UTC (History)
54 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description Rohit Keshri 2022-08-03 16:48:24 UTC
A contention-based side-channel vulnerability on some AMD CPUs using simultaneous multithreading (SMT) may allow an attacker to measure the contention level on scheduler queues, thereby leading to the potential leakage of sensitive information.

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues, an attacker may potentially leak sensitive information.

References
[1] https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039
[2] https://www.bearssl.org/constanttime.html
[3] https://www.chosenplaintext.ca/articles/beginners-guide-constant-time-cryptography.html

Comment 7 Todd Cullum 2022-08-09 18:16:15 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 2117012]


Note You need to log in before you can comment on or make changes to this bug.