Loading
xen: 4.20.0 -> 4.20.1
https://xenbits.xen.org/xsa/advisory-471.html Researchers from Microsoft and ETH Zurich have discovered several new speculative sidechannel attacks which bypass current protections. They are detailed in a paper titled "Enter, Exit, Page Fault, Leak: Testing Isolation Boundaries for Microarchitectural Leaks". Two issues, which AMD have named Transitive Scheduler Attacks, utilise timing information from instruction execution. These are: * CVE-2024-36350: TSA-SQ (TSA in the Store Queues) * CVE-2024-36357: TSA-L1 (TSA in the L1 data cache) For more information, see: https://www.amd.com/content/dam/amd/en/documents/resources/bulletin/technical-guidance-for-mitigating-transient-scheduler-attacks.pdf https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html https://aka.ms/enter-exit-leak Signed-off-by:Fernando Rodrigues <alpha@sigmasquadron.net>