[VU:155143] Linux kernel on Intel systems is susceptible to Spectre v2 attacks
Overview
A new cross-privilege Spectre v2 vulnerability that impacts modern CPU architectures supporting speculative execution has been discovered. CPU hardware utilizing speculative execution that are vulnerable to Spectre v2 branch history injection (BHI) are likely affected. An unauthenticated attacker can exploit this vulnerability to leak privileged memory from the CPU by speculatively jumping to a chosen gadget. Current research shows that existing mitigation techniques of disabling privileged eBPF and enabling (Fine)IBT are insufficient in stopping BHI exploitation against the kernel/hypervisor.
Description
Speculative execution is an optimization technique in which a computer system performs some task preemptively to improve performance and provide additional concurrency as and when extra resources are available. However, these speculative executions leave traces of memory accesses or computations in the CPU’s cache, buffer, and branch predictors. Attackers can take advantage of these and, in some cases, also influence speculative execution paths via malicious software to infer privileged data that is part of a distinct execution. See article Spectre Side Channels for more information. Attackers exploiting Spectre v2 take advantage of the speculative execution of indirect branch predictors, which are steered to gadget code by poisoning the branch target buffer of a CPU used for predicting indirect branch addresses, leaking arbitrary kernel memory and bypassing all currently deployed mitigations.
Current mitigations rely on the unavailability of exploitable gadgets to eliminate the attack surface. However, researchers demonstrated that with the use of their gadget analysis tool, InSpectre Gadget, they can uncover new, exploitable gadgets in the Linux kernel and that those are sufficient at bypassing deployed Intel mitigations.
Impact
An attacker with access to CPU resources may be able to read arbitrary privileged data or system registry values by speculatively jumping to a chosen gadget.
Solution
Please update your software according to the recommendations from respective vendors with the latest mitigations available to address this vulnerability and its variants.
Acknowledgements
Thanks to Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida from the VUSec group at VU Amsterdam for discovering and reporting this vulnerability, as well as supporting coordinated disclosure. This document was written by Dr. Elke Drennan, CISSP.
- ID
- VU:155143
- Severity
- medium
- Severity from
- CVE-2022-0001
- URL
- https://kb.cert.org/vuls/id/155143
- Published
-
2024-04-09T14:44:39
(5 months ago) - Modified
-
2024-08-06T17:08:28
(5 weeks ago) - Rights
- Copyright 2024, CERT Coordination Center (CERT/CC)
- Other Advisories
-
- ALAS-2022-1571
- ALAS2-2022-1761
- ALPINE:CVE-2024-2201
- ALSA-2022:1988
- ALSA-2024:5101
- DSA-5095-1
- DSA-5096-1
- DSA-5658-1
- ELSA-2022-1988
- ELSA-2024-12271
- ELSA-2024-12272
- ELSA-2024-12274
- ELSA-2024-12275
- ELSA-2024-12377
- ELSA-2024-12380
- ELSA-2024-12385
- ELSA-2024-5101
- FEDORA-2024-169a1cc589
- FEDORA-2024-4357ec611d
- FEDORA-2024-58c950d8d8
- FEDORA-2024-a46df5ba2f
- FEDORA-2024-a676697123
- openSUSE-SU-2022:0755-1
- openSUSE-SU-2022:0760-1
- openSUSE-SU-2022:0768-1
- openSUSE-SU-2022:0940-1
- RHSA-2022:1975
- RHSA-2022:1988
- RHSA-2024:5101
- RHSA-2024:5102
- RLSA-2022:1988
- RLSA-2024:5101
- SSA:2022-129-01
- SUSE-SU-2022:0755-1
- SUSE-SU-2022:0756-1
- SUSE-SU-2022:0757-1
- SUSE-SU-2022:0759-1
- SUSE-SU-2022:0760-1
- SUSE-SU-2022:0761-1
- SUSE-SU-2022:0762-1
- SUSE-SU-2022:0763-1
- SUSE-SU-2022:0764-1
- SUSE-SU-2022:0765-1
- SUSE-SU-2022:0766-1
- SUSE-SU-2022:0767-1
- SUSE-SU-2022:0768-1
- SUSE-SU-2022:0931-1
- SUSE-SU-2022:0939-1
- SUSE-SU-2022:0940-1
- SUSE-SU-2022:1196-1
- SUSE-SU-2022:1285-1
- SUSE-SU-2022:1300-1
- SUSE-SU-2022:1359-1
- SUSE-SU-2022:1375-1
- SUSE-SU-2022:1408-1
- SUSE-SU-2024:1259-1
- SUSE-SU-2024:1295-1
- SUSE-SU-2024:1322-1
- SUSE-SU-2024:1466-1
- SUSE-SU-2024:1480-1
- SUSE-SU-2024:1490-1
- SUSE-SU-2024:1540-1
- SUSE-SU-2024:1541-1
- SUSE-SU-2024:1643-1
- SUSE-SU-2024:1644-1
- SUSE-SU-2024:1646-1
- SUSE-SU-2024:1648-1
- SUSE-SU-2024:1870-1
- SUSE-SU-2024:2008-1
- SUSE-SU-2024:2190-1
- SUSE-SU-2024:2533-1
- SUSE-SU-2024:2534-1
- SUSE-SU-2024:2535-1
- USN-5317-1
- USN-5318-1
- USN-5319-1
- USN-5362-1
- USN-6765-1
- USN-6766-1
- USN-6766-2
- USN-6766-3
- USN-6774-1
- USN-6795-1
- USN-6828-1
- USN-6865-1
- USN-6866-1
- USN-6866-2
- USN-6866-3
- USN-6868-1
- USN-6868-2
- XSA-456
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |