<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <id>https://docs.oxide.computer/bulletins/undefined</id>
    <title>Oxide Announcements Security Bulletins</title>
    <updated>2026-04-08T15:56:08.940Z</updated>
    <generator>Remix using Feed for Node.js</generator>
    <author>
        <name>Oxide Computer Company</name>
        <email>info@oxide.computer</email>
        <uri>https://docs.oxide.computer</uri>
    </author>
    <link rel="alternate" href="https://docs.oxide.computer/bulletins/undefined"/>
    <link rel="self" href="https://docs.oxide.computer/security/undefined/feed"/>
    <subtitle>Security bulletins feed for Announcements</subtitle>
    <logo>https://docs.oxide.computer/favicon.png</logo>
    <icon>https://docs.oxide.computer/favicon.png</icon>
    <rights>Copyright © 2026 Oxide Computer Company</rights>
    <entry>
        <title type="html"><![CDATA[Oxide Security Announcement 20230808-2: OpenSSL Updates]]></title>
        <id>https://docs.oxide.computer/security/announcements/20230808-2</id>
        <link href="https://docs.oxide.computer/security/announcements/20230808-2"/>
        <updated>2023-08-08T12:00:00.000Z</updated>
        <content type="html"><![CDATA[<div id="content" class="asciidoc-body release-note-doc w-full"><div id="preamble"><div class="sectionbody"><div class="paragraph"><p>This security announcement details three OpenSSL CVEs:</p></div><div class="ulist"><ul class=""><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3817">CVE-2023-3817 Excessive
time spent checking DH q parameter value</a></p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-3446">CVE-2023-3446 Excessive time spent checking DH keys and parameters</a></p></li><li><p><a href="https://nvd.nist.gov/vuln/detail/CVE-2023-2975">CVE-2023-2975 AES-SIV implementation ignores empty associated data
entries</a></p></li></ul></div><div class="paragraph"><p>Oxide software embeds the OpenSSL libraries for use in TLS processing
and related cryptographic processing. We do not believe that these
vulnerabilities impact Oxide software. The next software release will
contain an update to OpenSSL.</p></div><div class="table-wrapper"><table class="tableblock frame-all grid-all stretch"><caption class="title"><a class="anchor" id="revision_history"></a><a href="#revision_history"><div class="title">Revision History</div></a></caption><colgroup><col style="width:33.3333%"/><col style="width:33.3333%"/><col style="width:33.3334%"/></colgroup><thead><tr><th class="tableblock halign-left valign-top">Revision</th><th class="tableblock halign-left valign-top">Date (YYYYMMDD)</th><th class="tableblock halign-left valign-top">Changes</th></tr></thead><tbody><tr><td class="tableblock halign-left valign-top"><p class="tableblock">1.0</p></td><td class="tableblock halign-left valign-top"><p class="tableblock">20230808</p></td><td class="tableblock halign-left valign-top"><p class="tableblock">Initial Release</p></td></tr></tbody></table></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_impacted_products" aria-hidden="true"></span><a class="link group" href="#_impacted_products">Impacted Products<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>Oxide Software Release v1.0.1. While the Oxide CLI embeds OpenSSL, it
does not currently utilize affected functionality.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_impact" aria-hidden="true"></span><a class="link group" href="#_impact">Impact<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>CVE&#8217;s 2023-3817 and 2023-3466 relate to similar paths where by
validating Diffie-Helman keys through OpenSSL&#8217;s <code>DH_check()</code> function
could lead to extended processing time. This could manifest as a denial
of service. CVE 2023-2975 relates to issues with the AES-SIV algorithm
that could allow empty data not to be properly authenticated. AES-SIV is
not currently used in Oxide products.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_action_required" aria-hidden="true"></span><a class="link group" href="#_action_required">Action Required<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>Please ensure to update to the next regularly scheduled Oxide release.</p></div><div class="paragraph"><p>For guest virtual machines, please check with your OS provider to ensure
that the latest version of OpenSSL (3.1.2, 3.0.10, 1.1.1v, 1.02zi) is
installed.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_mitigations" aria-hidden="true"></span><a class="link group" href="#_mitigations">Mitigations<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>There are no mitigations available at this time for this.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_technical_background" aria-hidden="true"></span><a class="link group" href="#_technical_background">Technical Background<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>For full details, please see the related OpenSSL write ups in
the Additional Information section.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_additional_information" aria-hidden="true"></span><a class="link group" href="#_additional_information">Additional Information<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="ulist"><ul class=""><li><p><a href="https://www.openssl.org/news/secadv/20230731.txt">OpenSSL CVE-2023-3817
Excessive time spent checking DH q parameter value</a> write up</p></li><li><p><a href="https://www.openssl.org/news/secadv/20230719.txt">OpenSSL CVE-2023-3446
Excessive time spent checking DH keys and parameters</a> write up</p></li><li><p><a href="https://www.openssl.org/news/secadv/20230714.txt">OpenSSL CVE-2023-2975
AES-SIV implementation ignores empty associated data entries</a> write up</p></li></ul></div></div></div></div>]]></content>
    </entry>
    <entry>
        <title type="html"><![CDATA[Oxide Security Announcement 20230808-1: CVE-2023-20593 Zenbleed]]></title>
        <id>https://docs.oxide.computer/security/announcements/20230808-1</id>
        <link href="https://docs.oxide.computer/security/announcements/20230808-1"/>
        <updated>2023-08-08T12:00:00.000Z</updated>
        <content type="html"><![CDATA[<div id="content" class="asciidoc-body release-note-doc w-full"><div id="preamble"><div class="sectionbody"><div class="paragraph"><p>This security announcement details an AMD side channel attack that
impacts AMD Zen 2 processors. Oxide products are not impacted by this
security vulnerability. This notice provides additional context on this
side channel attack that relies upon speculative execution in the
processor and is provided as additional background to aid in
understanding this and related issues. AMD calls this
<a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html">AMD-SB-7008
Cross-Process Information Leak</a>.</p></div><div class="table-wrapper"><table class="tableblock frame-all grid-all stretch"><caption class="title"><a class="anchor" id="revision_history"></a><a href="#revision_history"><div class="title">Revision History</div></a></caption><colgroup><col style="width:33.3333%"/><col style="width:33.3333%"/><col style="width:33.3334%"/></colgroup><thead><tr><th class="tableblock halign-left valign-top">Revision</th><th class="tableblock halign-left valign-top">Date (YYYYMMDD)</th><th class="tableblock halign-left valign-top">Changes</th></tr></thead><tbody><tr><td class="tableblock halign-left valign-top"><p class="tableblock">1.0</p></td><td class="tableblock halign-left valign-top"><p class="tableblock">20230808</p></td><td class="tableblock halign-left valign-top"><p class="tableblock">Initial Release</p></td></tr></tbody></table></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_impacted_products" aria-hidden="true"></span><a class="link group" href="#_impacted_products">Impacted Products<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>No Oxide products are impacted by this issue. No Oxide computer can boot
or operate with an AMD Zen 2 processor installed, nor will that be
offered in the future. This vulnerability impacts AMD Zen 2 based CPUs
which include the following:</p></div><div class="ulist"><ul class=""><li><p>AMD EPYC 7XX2 Rome (Family 17h, model 31h)</p></li><li><p>AMD Threadripper 3000 series Castle Peak (Family 17h, model 31h)</p></li><li><p>AMD Ryzen 3000 Series Matisse</p></li><li><p>AMD Ryzen 4000 Series Renoir (family 17h, model 60h)</p></li><li><p>AMD Ryzen 5000 Series Lucienne (family 17h, model 68h)</p></li><li><p>AMD Ryzen 7020 Series Mendocino (Family 17h, model a0h)</p></li></ul></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_impact" aria-hidden="true"></span><a class="link group" href="#_impact">Impact<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>There is no impact from this issue for Oxide products. The following
only applies to non-Oxide systems.</p></div><div class="paragraph"><p>This vulnerability allows the leaking of the upper 128-bits of the FPU
registers, which depending on the specifics of an operating system, can
contain sensitive information as many implementations of cryptography
algorithms or even basic memory copying leverage these registers. This
allows a process running on a core to see information left behind by a
prior process (regardless of whether that process is inside a virtual
machine or not).</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_action_required" aria-hidden="true"></span><a class="link group" href="#_action_required">Action Required<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>There is no action required for Oxide products.</p></div><div class="paragraph"><p>For other products and systems, please follow your vendor&#8217;s
documentation for determining if a Zen 2 CPU is installed is installed.
If you have a Zen 2 based CPU listed above installed in a non-Oxide
computer, please check that system&#8217;s OS or BIOS vendor to see if a CPU
microcode update is available.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_mitigations" aria-hidden="true"></span><a class="link group" href="#_mitigations">Mitigations<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>There are no mitigations available for Oxide systems as Oxide products
are not impacted by this vulnerability.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_technical_background" aria-hidden="true"></span><a class="link group" href="#_technical_background">Technical Background<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>For a more detailed explanation, please see the write up from
<a href="https://lock.cmpxchg8b.com/zenbleed.html">Tavis Ormandy</a> who discovered
this vulnerability.</p></div><div class="paragraph"><p>AMD CPUs support the AVX family of instructions. These instructions
extend the CPU&#8217;s vector registers to 256-bits often referred to as the
YMM registers. These registers shadow the original 128-bit XMM
registers. That is, <code>%xmm0[127:0]</code> is the same a <code>%ymm0[127:0]</code>. When
switching between the different classes of instructions, it is often
required to zero the upper 128-bits of a YMM register. This is most
often done with an explicit x86 instruction called <code>vzeroupper</code> which
zeros all upper bits of the vector registers.</p></div><div class="paragraph"><p>While x86 registers are explicitly named in the assembler, internally
the CPU is much more complex and the common names of registers points to
a register file . These hardware resources are
shared between both hardware threads within the core and is not
statically partitioned. When the <code>vzeroupper</code> instruction is used,
rather than actually zero the underlying data, it will often just set a
flag indicating that this is the case in the hardware.</p></div><div class="paragraph"><p>The problem occurs when the CPU speculatively executes a <code>vzeroupper</code> and
then aborts that due to a misprediction. This can lead the register
contents to then contain the prior contents prior to setting the zero
flag. This allows another user to read the prior data that was put into
the register by either hardware thread.</p></div></div></div><div class="sect1"><h2 data-sectnum=""><span class="anchor" id="_additional_information" aria-hidden="true"></span><a class="link group" href="#_additional_information">Additional Information<svg width="16" height="16" class="text-accent-secondary ml-2 hidden group-hover:inline-block"><use href="/assets/sprite-BV33W1VU.svg#link-16"></use></svg></a></h2><div class="sectionbody"><div class="paragraph"><p>The following URLs provide additional information about this
vulnerability.</p></div><div class="ulist"><ul class=""><li><p><a href="https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7008.html">AMD-SB-7008
Cross-Process Information Leak</a></p></li><li><p><a href="https://lock.cmpxchg8b.com/zenbleed.html">Tavis Ormandy&#8217;s (original
reporter) writeup</a></p></li></ul></div></div></div></div>]]></content>
    </entry>
</feed>