Description
The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176.

We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
Published: 2023-04-25
Score: 4.7 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3403-1 linux security update
Debian DLA Debian DLA DLA-3404-1 linux-5.10 security update
EUVD EUVD EUVD-2023-12148 The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
Ubuntu USN Ubuntu USN USN-5884-1 Linux kernel (AWS) vulnerabilities
Ubuntu USN Ubuntu USN USN-5913-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5914-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5915-1 Linux kernel (OEM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5917-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5924-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-5926-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5927-1 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-5934-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-5939-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-5940-1 Linux kernel (Raspberry Pi) vulnerabilities
Ubuntu USN Ubuntu USN USN-5951-1 Linux kernel (IBM) vulnerabilities
Ubuntu USN Ubuntu USN USN-5970-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5975-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5979-1 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-5981-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5982-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5984-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5987-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-5991-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-6000-1 Linux kernel (BlueField) vulnerabilities
Ubuntu USN Ubuntu USN USN-6004-1 Linux kernel (Intel IoTG) vulnerabilities
Ubuntu USN Ubuntu USN USN-6009-1 Linux kernel (GCP) vulnerabilities
Ubuntu USN Ubuntu USN USN-6030-1 Linux kernel (Qualcomm Snapdragon) vulnerabilities
History

Thu, 13 Feb 2025 16:45:00 +0000

Type Values Removed Values Added
Description The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96 The current implementation of the prctl syscall does not issue an IBPB immediately during the syscall. The ib_prctl_set  function updates the Thread Information Flags (TIFs) for the task and updates the SPEC_CTRL MSR on the function __speculation_ctrl_update, but the IBPB is only issued on the next schedule, when the TIF bits are checked. This leaves the victim vulnerable to values already injected on the BTB, prior to the prctl syscall.  The patch that added the support for the conditional mitigation via prctl (ib_prctl_set) dates back to the kernel 4.9.176. We recommend upgrading past commit a664ec9158eeddd75121d39c9a0758016097fa96
Title Incorrect indirect branch prediction barrier in the Linux Kernel Incorrect indirect branch prediction barrier in the Linux Kernel

Mon, 03 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Debian Debian Linux
Linux Linux Kernel
Netapp Active Iq Unified Manager H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: Google

Published:

Updated: 2025-02-13T16:38:41.984Z

Reserved: 2023-01-04T10:07:20.469Z

Link: CVE-2023-0045

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.575Z

cve-icon NVD

Status : Modified

Published: 2023-04-25T23:15:09.013

Modified: 2025-02-13T17:15:52.813

Link: CVE-2023-0045

cve-icon Redhat

Severity : Low

Publid Date: 2023-02-03T00:00:00Z

Links: CVE-2023-0045 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses