Security Vulnerability: Intra-Mode Branch Target Injection / Branch History Injection - CVE-2022-0001 / CVE-2022-0002 / CVE-2021-26401
This document (000020607) is provided subject to the disclaimer at the end of this document.
Security Researchers from VU Amsterdam have identified transient code execution attacks against the branch predictors, which would allow local attackers to gain otherwise confidential information, similar to the known Spectre Variant 2 attacks.
A simple attack vector to exploit these problems is using JITed eBPF programs.
Also the "EIBRS" mitigation of the Spectre v2 vulnerability on Intel x86 still was vulnerable. ( CVE-2022-0001 / CVE-2022-0002). Also the AMD specific retpoline code was vulnerable to the new attacks. ( CVE-2021-26401 )
SUSE is releasing kernel updates with these additional mitigations against these attacks.
Further mitigations require also gcc changes, these will be added in the near future.
This Support Knowledgebase provides a valuable tool for SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.
- Document ID:000020607
- Creation Date: 08-Mar-2022
- Modified Date:08-Mar-2022
- SUSE Linux Enterprise Server
- SUSE Linux Enterprise Server for SAP Applications
- SUSE Linux Enterprise Micro
For questions or concerns with the SUSE Knowledgebase please contact: tidfeedback[at]suse.com