[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252271

 
 

909

 
 

196835

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2023-0045Date: (C)2023-03-02   (M)2024-05-24


The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set ��function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. ��The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit��a664ec9158eeddd75121d39c9a0758016097fa96

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V3 Severity:CVSS V2 Severity:
CVSS Score : 7.5CVSS Score :
Exploit Score: 3.9Exploit Score:
Impact Score: 3.6Impact Score:
 
CVSS V3 Metrics:CVSS V2 Metrics:
Attack Vector: NETWORKAccess Vector:
Attack Complexity: LOWAccess Complexity:
Privileges Required: NONEAuthentication:
User Interaction: NONEConfidentiality:
Scope: UNCHANGEDIntegrity:
Confidentiality: HIGHAvailability:
Integrity: NONE 
Availability: NONE 
  
Reference:
https://git.kernel.org/tip/a664ec9158eeddd75121d39c9a0758016097fa96
https://github.com/google/security-research/security/advisories/GHSA-9x5g-vmxf-4qj8
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
https://security.netapp.com/advisory/ntap-20230714-0001/

CWE    1
CWE-610
OVAL    53
oval:org.secpod.oval:def:89048690
oval:org.secpod.oval:def:89049079
oval:org.secpod.oval:def:1701143
oval:org.secpod.oval:def:1701153
...

© SecPod Technologies