Incorrect indirect branch prediction barrier in the Linux Kernel
CVE-2023-0045
Key Information:
Badges
Summary
A security flaw exists in the implementation of the prctl syscall within the Linux Kernel, where an Immediate Buffer Partitioning Boundary (IBPB) is not executed promptly during the syscall execution. Instead, the IBPB is triggered only on the subsequent scheduling, compromising the task's Thread Information Flags (TIFs). As a result, the system remains exposed to potential exploitation from values already placed in the Branch Target Buffer (BTB) before the execution of the prctl syscall. To mitigate these risks, it is crucial to upgrade to versions released after commit a664ec9158eeddd75121d39c9a0758016097fa96.
Affected Version(s)
Linux Kernel 9137bb27e60e
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
Vulnerability published
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability Reserved