Wind River Security Vulnerability Notice: Special Register Buffer Data Sampling Advisory (CVE-2020-0543) for Wind River Linux
A potential security vulnerability in some Intel® Processors may allow
information disclosure. Intel is releasing firmware updates to mitigate
this potential vulnerability. Incomplete cleanup from specific special register read operations in
some Intel(R) Processors may allow an authenticated user to potentially
enable information disclosure via local access.
Affected Windriver Linux releases:
With the new microcde, this CVE issue will be mitegated by default. If you want to disable it, contact your BIOS vendor to downgrade the microcode, or Integrate kernel source patch once available.
NOTE: Linux kernel can'r mitigate this CVE issue, it can only show you its status and give you a method to disable the mitigation in runtime.
Note: For the microcode upgrading, we will update our recipe to align with Intel. But to make a full mitigation, the new microcode should be loaded in BIOS. So please contact your BIOS vendor for it.
Special Register Buffer Data Sampling Advisory
We will port all necessary kernel patches on all our supporting releases, at the same time, fetching and upgrading the microcode recipe. We will continue to update this web page and once we have any progress you can get it here.
For any questions or requirements, please contact your local WR support team, or mail to security-alert@windriver.com directly.
Please refer to your BIOS vendor to upgrade the microcode.
For linux kernel, we will fetch and integrate kernel patches once available.
1) Download the hotpatch locally and unpackage it:
# sha256sum LTS1019-x86_srbds_fixes.tar.bz2
f7cf3e3b6e4f67db330aea9f418bfcbb7cff3488c1b446096c02d1aa48ad95d3 LTS1019-x86_srbds_fixes.tar.bz2
# cd /PATH_2_hotpatches/
# tar jxvf LTS1019-x86_srbds_fixes.tar.bz2
2) Integrate them and rebuild the kernel image
# bitbake linux-yocto -c devshell
# git am /PATH_2_hotpatches/*patch
# make bzImage
...
1) Download the hotpatch locally and unpackage it:
# sha256sum LTS1018-x86_srbds_fixes.tar.bz2
a8e2283ee0aeb89738a65f62a92c101b9bc17cf6bf5698e91b2a7706b9943a06 LTS1018-x86_srbds_fixes.tar.bz2
# cd /PATH_2_hotpatches/
# tar jxvf LTS1018-x86_srbds_fixes.tar.bz2
2) Integrate them and rebuild the kernel image
# bitbake linux-yocto -c devshell
# git am /PATH_2_hotpatches/*patch
# make bzImage
...