Логотип exploitDog
bind:CVE-2023-1998
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-1998

Количество 22

Количество 22

ubuntu логотип

CVE-2023-1998

больше 2 лет назад

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
EPSS: Низкий
redhat логотип

CVE-2023-1998

больше 2 лет назад

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
EPSS: Низкий
nvd логотип

CVE-2023-1998

больше 2 лет назад

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
EPSS: Низкий
msrc логотип

CVE-2023-1998

больше 2 лет назад

CVSS3: 5.6
EPSS: Низкий
debian логотип

CVE-2023-1998

больше 2 лет назад

The Linux kernel allows userspace processes to enable mitigations by c ...

CVSS3: 5.6
EPSS: Низкий
fstec логотип

BDU:2023-02115

больше 2 лет назад

Уязвимость функции prctl ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.6
EPSS: Низкий
oracle-oval логотип

ELSA-2023-4377

около 2 лет назад

ELSA-2023-4377: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2156-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2151-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2163-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2162-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2231-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2141-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2140-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2146-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2148-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2232-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2805-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий
oracle-oval логотип

ELSA-2023-7077

больше 1 года назад

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2023:2646-1

около 2 лет назад

Security update for the Linux Kernel

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-1998

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
redhat логотип
CVE-2023-1998

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
nvd логотип
CVE-2023-1998

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
msrc логотип
CVSS3: 5.6
0%
Низкий
больше 2 лет назад
debian логотип
CVE-2023-1998

The Linux kernel allows userspace processes to enable mitigations by c ...

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-02115

Уязвимость функции prctl ядра операционной системы Linux, позволяющая нарушителю получить доступ к защищаемой информации

CVSS3: 5.6
0%
Низкий
больше 2 лет назад
oracle-oval логотип
ELSA-2023-4377

ELSA-2023-4377: kernel security, bug fix, and enhancement update (IMPORTANT)

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2156-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2151-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2163-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2162-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2231-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2141-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2140-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2146-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2148-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2232-1

Security update for the Linux Kernel

около 2 лет назад
suse-cvrf логотип
SUSE-SU-2023:2805-1

Security update for the Linux Kernel

около 2 лет назад
oracle-oval логотип
ELSA-2023-7077

ELSA-2023-7077: kernel security, bug fix, and enhancement update (IMPORTANT)

больше 1 года назад
suse-cvrf логотип
SUSE-SU-2023:2646-1

Security update for the Linux Kernel

около 2 лет назад

Уязвимостей на страницу