First published: Tue Jun 29 2021(Updated: )
x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend.
Credit: security@xen.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | >=4.12<=4.15.0 | |
Xen xen-unstable | =4.15.0-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-28690 is considered a significant vulnerability related to the TSX Async Abort speculative execution issue.
To mitigate CVE-2021-28690, it is recommended to disable TSX as the default option.
CVE-2021-28690 affects several versions of Xen, specifically versions up to 4.15.0.
Yes, patches for CVE-2021-28690 are included in newer versions of the Xen software.
TSX Async Abort refers to a speculative execution vulnerability that can lead to unauthorized access to sensitive information.