Количество 20
Количество 20
CVE-2023-0045
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
CVE-2023-0045
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
CVE-2023-0045
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
CVE-2023-0045
The current implementation of the prctl syscall does not issue an IBPB ...
BDU:2023-00749
Уязвимость функции ib_prctl_set() ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации.
SUSE-SU-2023:0485-1
Security update for the Linux Kernel
SUSE-SU-2023:0796-1
Security update for the Linux Kernel
SUSE-SU-2023:0852-1
Security update for the Linux Kernel
SUSE-SU-2023:0634-1
Security update for the Linux Kernel
SUSE-SU-2023:0778-1
Security update for the Linux Kernel
SUSE-SU-2023:0768-1
Security update for the Linux Kernel
SUSE-SU-2023:0618-1
Security update for the Linux Kernel
SUSE-SU-2023:0488-1
Security update for the Linux-RT Kernel
SUSE-SU-2023:0780-1
Security update for the Linux Kernel
SUSE-SU-2023:0774-1
Security update for the Linux Kernel
SUSE-SU-2023:1710-1
Security update for the Linux Kernel
SUSE-SU-2023:1608-1
Security update for the Linux Kernel
SUSE-SU-2023:2646-1
Security update for the Linux Kernel
SUSE-SU-2023:2871-1
Security update for the Linux Kernel
SUSE-SU-2023:2809-1
Security update for the Linux Kernel
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2023-0045 The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96 | CVSS3: 4.7 | 0% Низкий | почти 3 года назад | |
CVE-2023-0045 The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96 | CVSS3: 4.7 | 0% Низкий | около 3 лет назад | |
CVE-2023-0045 The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall. The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96 | CVSS3: 4.7 | 0% Низкий | почти 3 года назад | |
CVE-2023-0045 The current implementation of the prctl syscall does not issue an IBPB ... | CVSS3: 4.7 | 0% Низкий | почти 3 года назад | |
BDU:2023-00749 Уязвимость функции ib_prctl_set() ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации. | CVSS3: 7.5 | 0% Низкий | около 3 лет назад | |
SUSE-SU-2023:0485-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0796-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0852-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0634-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0778-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0768-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0618-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:0488-1 Security update for the Linux-RT Kernel | почти 3 года назад | |||
SUSE-SU-2023:0780-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:0774-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:1710-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:1608-1 Security update for the Linux Kernel | почти 3 года назад | |||
SUSE-SU-2023:2646-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2871-1 Security update for the Linux Kernel | больше 2 лет назад | |||
SUSE-SU-2023:2809-1 Security update for the Linux Kernel | больше 2 лет назад |
Уязвимостей на страницу