Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11135

Опубликовано: 12 нояб. 2019
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

A flaw was found in the way Intel CPUs handle speculative execution of instructions when the TSX Asynchronous Abort (TAA) error occurs. A local authenticated attacker with the ability to monitor execution times could infer the TSX memory state by comparing abort execution times. This could allow information disclosure via this observed side-channel for any TSX transaction being executed while an attacker is able to observe abort timing. Intel's Transactional Synchronisation Extensions (TSX) are set of instructions which enable transactional memory support to improve performance of the multi-threaded applications, in the lock-protected critical sections. The CPU executes instructions in the critical-sections as transactions, while ensuring their atomic state. When such transaction execution is unsuccessful, the processor cannot ensure atomic updates to the transaction memory, so the processor rolls back or aborts such transaction execution. While TSX Asynchronous Abort (TAA) is pending, CPU may continue to read data from architectural buffers and pass it to the dependent speculative operations. This may cause information leakage via speculative side-channel means, which is quite similar to the Microarchitectural Data Sampling (MDS) issue.

Отчет

libvirt and qemu-kvm on Red Hat Enterprise Linux 6 are not affected by this vulnerability as they do not support MSR-based CPU features.

Меры по смягчению последствий

For mitigation related information, please refer to the Red Hat Knowledgebase article: https://access.redhat.com/solutions/tsx-asynchronousabort

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelOut of support scope
Red Hat Enterprise Linux 5microcode_ctlOut of support scope
Red Hat Enterprise Linux 6libvirtNot affected
Red Hat Enterprise Linux 6microcode_ctlAffected
Red Hat Enterprise Linux 6qemu-kvmNot affected
Red Hat Enterprise Linux 7kernel-altNot affected
Red Hat Enterprise Linux 7libvirtAffected
Red Hat Enterprise Linux 7microcode_ctlAffected
Red Hat Enterprise Linux 7qemu-kvm-rhevAffected
Red Hat Enterprise Linux 8microcode_ctlAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-226->CWE-385->CWE-203
https://bugzilla.redhat.com/show_bug.cgi?id=1753062hw: TSX Transaction Asynchronous Abort (TAA)

EPSS

Процентиль: 60%
0.00394
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 5 лет назад

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

CVSS3: 6.5
nvd
больше 5 лет назад

TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.

CVSS3: 4.7
msrc
больше 5 лет назад

Windows Kernel Information Disclosure Vulnerability

CVSS3: 6.5
debian
больше 5 лет назад

TSX Asynchronous Abort condition on some CPUs utilizing speculative ex ...

rocky
больше 5 лет назад

Moderate: virt:rhel security update

EPSS

Процентиль: 60%
0.00394
Низкий

6.5 Medium

CVSS3