Bug 2223949 (CVE-2022-40982, Downfall) - CVE-2022-40982 hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
Summary: CVE-2022-40982 hw: Intel: Gather Data Sampling (GDS) side channel vulnerability
Keywords:
Status: NEW
Alias: CVE-2022-40982, Downfall
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2229887 2223992 2223993 2223994 2223995 2229727 2229728 2229729 2229730 2229731 2229732 2229733 2229873 2229874 2229875 2229876 2229877 2229878 2229879 2229880 2229881 2229882 2229883 2229884 2229885 2229886 2229888 2229889 2229890 2229891 2229892 2229893 2229894 2230086 2235640 2235641 2235642
Blocks: 2224000
TreeView+ depends on / blocked
 
Reported: 2023-07-19 11:35 UTC by Rohit Keshri
Modified: 2024-04-18 04:20 UTC (History)
62 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A Gather Data Sampling (GDS) transient execution side-channel vulnerability was found affecting certain Intel processors. This issue may allow a local attacker using gather instruction (load from memory) to infer stale data from previously used vector registers on the same physical core.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Knowledge Base (Solution) 7027704 0 None None None 2023-08-14 13:26:45 UTC
Red Hat Product Errata RHBA-2023:6835 0 None None None 2023-11-09 07:11:05 UTC
Red Hat Product Errata RHBA-2023:7268 0 None None None 2023-11-15 18:25:00 UTC
Red Hat Product Errata RHBA-2023:7328 0 None None None 2023-11-16 11:39:10 UTC
Red Hat Product Errata RHBA-2023:7338 0 None None None 2023-11-16 18:04:34 UTC
Red Hat Product Errata RHBA-2023:7343 0 None None None 2023-11-20 01:59:03 UTC
Red Hat Product Errata RHBA-2023:7346 0 None None None 2023-11-20 09:26:02 UTC
Red Hat Product Errata RHBA-2023:7496 0 None None None 2023-11-27 14:41:34 UTC
Red Hat Product Errata RHBA-2024:0637 0 None None None 2024-02-01 00:09:03 UTC
Red Hat Product Errata RHBA-2024:0673 0 None None None 2024-02-05 10:13:15 UTC
Red Hat Product Errata RHSA-2023:6583 0 None None None 2023-11-07 08:20:45 UTC
Red Hat Product Errata RHSA-2023:6901 0 None None None 2023-11-14 15:15:56 UTC
Red Hat Product Errata RHSA-2023:7077 0 None None None 2023-11-14 15:21:18 UTC
Red Hat Product Errata RHSA-2023:7370 0 None None None 2023-11-21 11:24:51 UTC
Red Hat Product Errata RHSA-2023:7379 0 None None None 2023-11-21 10:25:09 UTC
Red Hat Product Errata RHSA-2023:7423 0 None None None 2023-11-21 15:37:29 UTC
Red Hat Product Errata RHSA-2023:7424 0 None None None 2023-11-21 15:08:20 UTC
Red Hat Product Errata RHSA-2023:7539 0 None None None 2023-11-28 15:35:43 UTC
Red Hat Product Errata RHSA-2024:0412 0 None None None 2024-01-24 16:44:13 UTC
Red Hat Product Errata RHSA-2024:0562 0 None None None 2024-01-30 12:27:52 UTC
Red Hat Product Errata RHSA-2024:0563 0 None None None 2024-01-30 12:26:56 UTC
Red Hat Product Errata RHSA-2024:1250 0 None None None 2024-03-12 00:43:43 UTC
Red Hat Product Errata RHSA-2024:1268 0 None None None 2024-03-12 11:43:23 UTC
Red Hat Product Errata RHSA-2024:1269 0 None None None 2024-03-12 11:45:53 UTC
Red Hat Product Errata RHSA-2024:1306 0 None None None 2024-03-13 09:08:35 UTC

Description Rohit Keshri 2023-07-19 11:35:32 UTC
Gather Date Sampling (GDS) is a transient execution side channel vulnerability affecting certain Intel processor. In this flaw, a local attack using gather instruction (load from memory) may infer stale data from previously used vector registers on the same physical core.

Comment 2 Rohit Keshri 2023-07-19 12:44:16 UTC
Intel Processors supporting Trust Domain Extension (Intel TDX) are not affected by GDS.

Comment 3 Rohit Keshri 2023-07-19 12:56:01 UTC
* Gather feature is provided by Intel AVX2 and Intel AVX-512 (Intel Advanced extensions)
* It comprises of single-instruction, multiple data instruction, which fetch non-contiguous data element from memory using vector-index memory addressing.
* The scope of of stale data exposure is limited to dame physical processor core.
* Attacker cannot directly control or specify the source of the stale data, it is small and uncontrolled set of data.
* Since it is an uncontrolled set of stale data, data correlation and speculation could be difficult.

Comment 13 Rohit Keshri 2023-08-08 17:10:56 UTC
Created microcode_ctl tracking bugs for this issue:

Affects: fedora-all [bug 2230086]

Comment 18 errata-xmlrpc 2023-11-07 08:20:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:6583 https://access.redhat.com/errata/RHSA-2023:6583

Comment 19 errata-xmlrpc 2023-11-14 15:15:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:6901 https://access.redhat.com/errata/RHSA-2023:6901

Comment 20 errata-xmlrpc 2023-11-14 15:21:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:7077 https://access.redhat.com/errata/RHSA-2023:7077

Comment 21 errata-xmlrpc 2023-11-21 10:25:04 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2023:7379 https://access.redhat.com/errata/RHSA-2023:7379

Comment 22 errata-xmlrpc 2023-11-21 11:24:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2023:7370 https://access.redhat.com/errata/RHSA-2023:7370

Comment 23 errata-xmlrpc 2023-11-21 15:08:15 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:7424 https://access.redhat.com/errata/RHSA-2023:7424

Comment 24 errata-xmlrpc 2023-11-21 15:37:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:7423 https://access.redhat.com/errata/RHSA-2023:7423

Comment 25 errata-xmlrpc 2023-11-28 15:35:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2023:7539 https://access.redhat.com/errata/RHSA-2023:7539

Comment 28 errata-xmlrpc 2024-01-24 16:44:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0412 https://access.redhat.com/errata/RHSA-2024:0412

Comment 29 errata-xmlrpc 2024-01-30 12:26:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2024:0563 https://access.redhat.com/errata/RHSA-2024:0563

Comment 30 errata-xmlrpc 2024-01-30 12:27:47 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0562 https://access.redhat.com/errata/RHSA-2024:0562

Comment 33 errata-xmlrpc 2024-03-12 00:43:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1250 https://access.redhat.com/errata/RHSA-2024:1250

Comment 34 errata-xmlrpc 2024-03-12 11:43:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions

Via RHSA-2024:1268 https://access.redhat.com/errata/RHSA-2024:1268

Comment 35 errata-xmlrpc 2024-03-12 11:45:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2024:1269 https://access.redhat.com/errata/RHSA-2024:1269

Comment 36 errata-xmlrpc 2024-03-13 09:08:31 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:1306 https://access.redhat.com/errata/RHSA-2024:1306


Note You need to log in before you can comment on or make changes to this bug.