CERT Recently Published Vulnerability Notes 2024年07月06日
VU#155143: Linux kernel on Intel systems is susceptible to Spectre v2 attacks
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

最新发现的Spectre v2漏洞利用了现代CPU架构中支持推测执行的跨特权漏洞,影响了所有支持推测执行的CPU硬件,攻击者可通过该漏洞泄露CPU的敏感数据。

🤔 该漏洞利用了推测执行技术,攻击者可以通过恶意软件利用CPU缓存和分支预测器中的痕迹来推断敏感数据。

🧐 攻击者利用Spectre v2漏洞会影响CPU的间接分支预测器,通过污染CPU的分支目标缓冲区,将间接分支地址引导到恶意代码,从而泄露内核内存,绕过所有已部署的缓解措施。

⚠️ 目前的缓解措施依赖于无法利用的恶意代码,但这项研究表明,即使启用了Intel的缓解措施,攻击者仍然可以使用InSpectre Gadget工具找到新的可利用恶意代码,从而绕过这些措施。

🆘 该漏洞可能导致攻击者读取任意特权数据或系统注册表值。

🛡️ 建议用户更新软件,并使用最新版本的缓解措施来解决该漏洞及其变体。

Overview

A new cross-privilege Spectre v2 vulnerability that impacts modern CPU architectures supporting speculative execution has been discovered. CPU hardware utilizing speculative execution that are vulnerable to Spectre v2 branch history injection (BHI) are likely affected. An unauthenticated attacker can exploit this vulnerability to leak privileged memory from the CPU by speculatively jumping to a chosen gadget. Current research shows that existing mitigation techniques of disabling privileged eBPF and enabling (Fine)IBT are insufficient in stopping BHI exploitation against the kernel/hypervisor.

Description

Speculative execution is an optimization technique in which a computer system performs some task preemptively to improve performance and provide additional concurrency as and when extra resources are available. However, these speculative executions leave traces of memory accesses or computations in the CPU’s cache, buffer, and branch predictors. Attackers can take advantage of these and, in some cases, also influence speculative execution paths via malicious software to infer privileged data that is part of a distinct execution. See article Spectre Side Channels for more information. Attackers exploiting Spectre v2 take advantage of the speculative execution of indirect branch predictors, which are steered to gadget code by poisoning the branch target buffer of a CPU used for predicting indirect branch addresses, leaking arbitrary kernel memory and bypassing all currently deployed mitigations.

Current mitigations rely on the unavailability of exploitable gadgets to eliminate the attack surface. However, researchers demonstrated that with the use of their gadget analysis tool, InSpectre Gadget, they can uncover new, exploitable gadgets in the Linux kernel and that those are sufficient at bypassing deployed Intel mitigations.

Impact

An attacker with access to CPU resources may be able to read arbitrary privileged data or system registry values by speculatively jumping to a chosen gadget.

Solution

Please update your software according to the recommendations from respective vendors with the latest mitigations available to address this vulnerability and its variants.

Acknowledgements

Thanks to Sander Wiebing, Alvise de Faveri Tron, Herbert Bos, and Cristiano Giuffrida from the VUSec group at VU Amsterdam for discovering and reporting this vulnerability, as well as supporting coordinated disclosure. This document was written by Dr. Elke Drennan, CISSP.

Vendor Information

One or more vendors are listed for this advisory. Please reference the full report for more information.

Other Information

CVE IDs: CVE-2022-0001 CVE-2024-2201
Date Public: 2024-04-09
Date First Published: 2024-04-09
Date Last Updated: 2024-06-13 15:44 UTC
Document Revision: 5

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Spectre v2 推测执行 CPU漏洞 安全风险
相关文章