Lucene search

K
xenXen ProjectXSA-436
HistoryAug 01, 2023 - 2:44 p.m.

arm: Guests can trigger a deadlock on Cortex-A77

2023-08-0114:44:00
Xen Project
xenbits.xen.org
25
guest deadlock
cortex-a77
erratum 1508412
load to device
non-cacheable memory
store exclusive
register read
par_el1
xen
arm

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.1%

ISSUE DESCRIPTION

Cortex-A77 cores (r0p0 and r1p0) are affected by erratum 1508412 where software, under certain circumstances, could deadlock a core due to the execution of either a load to device or non-cacheable memory, and either a store exclusive or register read of the Physical Address Register (PAR_EL1) in close proximity.

IMPACT

A (malicious) guest that doesn’t include the workaround for erratum 1508412 could deadlock the core. This will ultimately result to a deadlock of the system.

VULNERABLE SYSTEMS

Systems running all version of Xen are affected.
This bug is specific to Arm Cortex-A77 cores r0p0 and r1p0.

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.1%