Описание
In the Linux kernel, the following vulnerability has been resolved:
ipv4: prevent potential spectre v1 gadget in fib_metrics_match()
if (!type)
continue;
if (type > RTAX_MAX)
return false;
...
fi_val = fi->fib_metrics->metrics[type - 1];
@type being used as an array index, we need to prevent
cpu speculation or risk leaking kernel memory content.
A flaw was found in the fib_metrics_match function in the net/ipv4/fib_semantics.c file in the Linux kernel, which contains source code that can lead to CPU speculation or risk leaking kernel memory content. Specifically, this vulnerability can allows an attacker to exploit a Spectre v1 gadget attack.
Отчет
Red Hat Product Security has rated this update with a security impact of Moderate. All Red Hat products are being evaluated for impact and Red Hat will work with the Linux community to analyze and correct any issues found. Successful exploitation of this flaw requires the attacker to have advanced knowledge of the software versions used on the system. For additional information about this flaw including possible mitigations please refer to: https://access.redhat.com/solutions/3545361
Меры по смягчению последствий
Mitigation for this issue is either not available or the currently available options does not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 10 | kernel | Not affected | ||
Red Hat Enterprise Linux 6 | kernel | Under investigation | ||
Red Hat Enterprise Linux 7 | kernel | Under investigation | ||
Red Hat Enterprise Linux 7 | kernel-rt | Under investigation | ||
Red Hat Enterprise Linux 8 | kernel | Out of support scope | ||
Red Hat Enterprise Linux 8 | kernel-rt | Out of support scope | ||
Red Hat Enterprise Linux 9 | kernel | Not affected | ||
Red Hat Enterprise Linux 9 | kernel-rt | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.3 High
CVSS3
Связанные уязвимости
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
In the Linux kernel, the following vulnerability has been resolved: i ...
In the Linux kernel, the following vulnerability has been resolved: ipv4: prevent potential spectre v1 gadget in fib_metrics_match() if (!type) continue; if (type > RTAX_MAX) return false; ... fi_val = fi->fib_metrics->metrics[type - 1]; @type being used as an array index, we need to prevent cpu speculation or risk leaking kernel memory content.
Уязвимость функции fib_metrics_match() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
EPSS
7.3 High
CVSS3