Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-27672

Опубликовано: 14 фев. 2023
Источник: redhat
CVSS3: 4.7
EPSS Низкий

Описание

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure.

Отчет

The Red Hat Enterprise Linux 8 and 9 are not affected if spectre_v2 mitigation enabled (and it is enabled by default).

Меры по смягчению последствий

The current mitigations for spectre V4 (or spectre_v2) should mitigate this flaw, no additional steps will need to be taken. In more details, according to the article https://kernel.org/doc/html//next/admin-guide/hw-vuln/cross-thread-rsb.html Two mitigations are needed:

  1. Stuff the RSB during context switch which is already being done in RHEL8/RHEL9 as long as the spectre_v2 mitigation is active.
  2. For KVM, the mitigation for the KVM_CAP_X86_DISABLE_EXITS capability can be turned on using the boolean module parameter mitigate_smt_rsb, e.g. vm.mitigate_smt_rsb=1. The command to check if mitigation is active: cat /sys/devices/system/cpu/vulnerabilities/spectre_v2

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6kernelOut of support scope
Red Hat Enterprise Linux 7kernelOut of support scope
Red Hat Enterprise Linux 7kernel-rtOut of support scope
Red Hat Enterprise Linux 8kernelNot affected
Red Hat Enterprise Linux 8kernel-rtNot affected
Red Hat Enterprise Linux 9kernelAffected
Red Hat Enterprise Linux 9kernel-rtAffected
Red Hat Enterprise Linux 9.2 Extended Update SupportkernelFixedRHSA-2023:737021.11.2023
Red Hat Enterprise Linux 9.2 Extended Update Supportkernel-rtFixedRHSA-2023:737921.11.2023

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=2174765kernel: AMD: Cross-Thread Return Address Predictions

EPSS

Процентиль: 31%
0.00115
Низкий

4.7 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.7
ubuntu
больше 2 лет назад

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

CVSS3: 4.7
nvd
больше 2 лет назад

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

CVSS3: 4.7
debian
больше 2 лет назад

When SMT is enabled, certain AMD processors may speculatively execute ...

suse-cvrf
больше 2 лет назад

Security update for xen

CVSS3: 4.7
github
больше 2 лет назад

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

EPSS

Процентиль: 31%
0.00115
Низкий

4.7 Medium

CVSS3