Vulnerability Description
x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires selecting a non-default setting in MSR_TSX_CTRL. This setting isn't restored after S3 suspend.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | >= 4.12, <= 4.15.0 |
References
- https://security.gentoo.org/glsa/202107-30Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-377.txtPatchVendor Advisory
- https://security.gentoo.org/glsa/202107-30Third Party Advisory
- https://xenbits.xenproject.org/xsa/advisory-377.txtPatchVendor Advisory
FAQ
What is CVE-2021-28690?
CVE-2021-28690 is a vulnerability with a CVSS score of 6.5 (MEDIUM). x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for detail...
How severe is CVE-2021-28690?
CVE-2021-28690 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-28690?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.