Security Vulnerability: Intra-Mode Branch Target Injection / Branch History Injection - CVE-2022-0001 / CVE-2022-0002 / CVE-2021-26401
This document (000020607) is provided subject to the disclaimer at the end of this document.
Environment
- https://www.suse.com/security/cve/CVE-2022-0001.html
- https://www.suse.com/security/cve/CVE-2022-0002.html
- https://www.suse.com/security/cve/CVE-2021-26401.html
Situation
Security Researchers from VU Amsterdam have identified transient code execution attacks against the branch predictors, which would allow local attackers to gain otherwise confidential information, similar to the known Spectre Variant 2 attacks.
A simple attack vector to exploit these problems is using JITed eBPF programs.
Also the "EIBRS" mitigation of the Spectre v2 vulnerability on Intel x86 still was vulnerable. ( CVE-2022-0001 / CVE-2022-0002). Also the AMD specific retpoline code was vulnerable to the new attacks. ( CVE-2021-26401 )
Resolution
SUSE is releasing kernel updates with these additional mitigations against these attacks.
Lookout
Further mitigations require also gcc changes, these will be added in the near future.
Status
Additional Information
Disclaimer
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000020607
- Creation Date: 08-Mar-2022
- Modified Date:08-Mar-2022
-
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Linux Enterprise Micro
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com