Today's hardware vulnerability: register file data sampling
RFDS may allow a malicious actor to infer data values previously used in floating point registers, vector registers, or integer registers. RFDS does not provide the ability to choose which data is inferred
Only Atom cores are affected, but those cores can be found inside a number
of processors. See this documentation
commit for more information.
Posted Mar 12, 2024 21:35 UTC (Tue)
by developer122 (guest, #152928)
[Link] (6 responses)
Posted Mar 12, 2024 22:29 UTC (Tue)
by hmh (subscriber, #3838)
[Link] (5 responses)
Posted Mar 12, 2024 23:00 UTC (Tue)
by Heretic_Blacksheep (guest, #169992)
[Link] (4 responses)
https://www.intel.com/content/www/us/en/developer/article...
I wouldn't assume previous unsupported generations of Atom processors aren't vulnerable because they're not listed. Intel specifically says in the fine print for the consolidated table:
They may or may not be vulnerable. Intel isn't going to bother to check. It's left as an exercise to those who own and may still use those processors to check if RFDS (and any future hardware vulns) affect them and what to do about it.
That said, any of the in-order Atom CPUs probably won't be affected by hardware vulns that require speculative out-of-order execution. But if I'm reading the disclosure correctly, this isn't one of those vulnerabilities. Instead, it's a stale data not being cleared after processing vulnerability that can potentially leak sensitive data from places that shouldn't be leaking like the SGX domain or privileged kernel data using the AES-NI instructions. Spectre branch misprediction exploitation doesn't appear to be required here.
Posted Mar 13, 2024 2:47 UTC (Wed)
by willy (subscriber, #9762)
[Link] (1 responses)
Posted Mar 13, 2024 16:42 UTC (Wed)
by Sesse (subscriber, #53779)
[Link]
It's hard to find information about this now, though.
Posted Mar 14, 2024 7:25 UTC (Thu)
by anton (subscriber, #25547)
[Link] (1 responses)
The Silvermont and Airmont microarchitectures are between Bonnell and the listed Goldmont. Are there no supported products with these microarchitectures? My impression is that "Atom" cores are used longer in products than "Core" cores, and they might well be still supported.
Posted Mar 14, 2024 10:33 UTC (Thu)
by anton (subscriber, #25547)
[Link]
Concerning Airmont, I have not looked around until I found a CPU with Airmont that is still being considered in service, but Airmont is mostly a shrink of Silvermont, so it is unlikely to be affected if Silvermont is not; or in other words, it is more likely that they introduced this bug between Airmont and Goldmont than between Silvermont and Airmont.
Posted Mar 12, 2024 22:19 UTC (Tue)
by flussence (guest, #85566)
[Link]
Posted Mar 13, 2024 9:51 UTC (Wed)
by ianmcc (subscriber, #88379)
[Link] (1 responses)
Posted Mar 13, 2024 16:12 UTC (Wed)
by k3ninho (subscriber, #50375)
[Link]
K3n.
Posted Mar 15, 2024 13:56 UTC (Fri)
by hmh (subscriber, #3838)
[Link]
So, anything that comes after the augmented VERW instruction is potentially leaked to the next context that runs (can be userspace, or a VM, etc). I believe there is an exception for instructions that switch away from SGX and SMM, which were also modified to clear the register file (or so I believe from a cursory reading of the Intel documentation).
Is there any relevant security impact from this? It looks like it might let one derive the approximate location of the syscall return stack and routine... how much does this impact ASLR ?
Obviously this can also be mitigated at "high cost" anywhere P-cores are available, by restricting all kernel code to run only on P-cores... at which point it might make more sense to just disable E-cores (and SMT, or it would be just security theater -- at least until we can ensure the kernel always context switches the entire core when entering or leaving kernel mode, or a VM).
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
"Refer to the 2022-2024 tab of the consolidated Affected Processors table: Register File Data Sampling column. Processors which have reached their End Of Servicing Lifetime are not listed in the consolidated table. Intel does not plan to evaluate whether any such processors are affected. Refer to the Support page for more information."
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
Bonnell (the in-order microarchitecture of the first Atom generation) is unlikely to be affected, because 1) it's completely different from the OoO microarchitectures used in later generations and, in particular, 2) it does not use register renaming, so there are no stale physical registers; all physical registers are architectural and directly readable.
Today's hardware vulnerability: register file data sampling
Looking around a bit, at least the Silvermont-based Atom E3805 is still in the marketing status "launched" (rather than "discontinued"), so I would expect that Intel has checked Silvermont and that they think that Silvermont is not affected.
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
Today's hardware vulnerability: register file data sampling
Does mitigated RFDS still leak kernel address layout information?