公告ID: KYLIN-2019-11135
安全等级: 中等
产品: Kylin V3
发布日期: 2019年11月12日
CVE: CVE-2019-11135
CVSS3评分: 6.5
概述:
描述:
A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing. Intel's Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution. While TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue. 系统版本:
KYLIN 3.0.x
KYLIN 3.0.x
KYLIN 3.2.x
KYLIN 3.2.x
KYLIN 3.2.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.4.x
KYLIN 3.4.x
KYLIN 3.4.x
KYLIN 3.4.x
KYLIN 3.2.x
KYLIN 3.3.x
KYLIN 3.3.x
KYLIN 3.4.x
KYLIN 3.4.x
受影响包列表:
microcode_ctl
kernel
qemu-kvm
libvirt
microcode_ctl
kpatch
microcode_ctl
libvirt
qemu-kvm
kernel-alt
kpatch
microcode_ctl
virt:rhel/libvirt
virt:rhel/qemu-kvm
kernel-2.6.32-754.24.2.el6
kernel-3.10.0-1062.4.2.el7
kernel-rt-3.10.0-1062.4.2.rt56.1028.el7
kernel-4.18.0-147.0.2.el8_1
kernel-rt-4.18.0-147.0.2.rt24.94.el8_1