mirror of
https://github.com/speed47/spectre-meltdown-checker.git
synced 2026-04-03 13:47:08 +02:00
doc: CVE-2018-15572 is already implemented along Spectre V2
This commit is contained in:
@@ -4,19 +4,32 @@ This document lists transient execution CVEs that have been evaluated and determ
|
|||||||
|
|
||||||
## CVE-2018-9056 — BranchScope
|
## CVE-2018-9056 — BranchScope
|
||||||
|
|
||||||
**Issue:** [#169](https://github.com/speed47/spectre-meltdown-checker/issues/169)
|
- **Issue:** [#169](https://github.com/speed47/spectre-meltdown-checker/issues/169)
|
||||||
**Research paper:** [BranchScope (ASPLOS 2018)](http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf)
|
- **Research paper:** [BranchScope (ASPLOS 2018)](http://www.cs.ucr.edu/~nael/pubs/asplos18.pdf)
|
||||||
**Red Hat bug:** [#1561794](https://bugzilla.redhat.com/show_bug.cgi?id=1561794)
|
- **Red Hat bug:** [#1561794](https://bugzilla.redhat.com/show_bug.cgi?id=1561794)
|
||||||
**CVSS:** 5.6 (Medium)
|
- **CVSS:** 5.6 (Medium)
|
||||||
|
|
||||||
A speculative execution attack exploiting the directional branch predictor, allowing an attacker to infer data by manipulating the shared branch prediction state (pattern history table). Initially demonstrated on Intel processors.
|
A speculative execution attack exploiting the directional branch predictor, allowing an attacker to infer data by manipulating the shared branch prediction state (pattern history table). Initially demonstrated on Intel processors.
|
||||||
|
|
||||||
**Why out of scope:** No kernel or microcode mitigations have been issued. Red Hat closed their tracking bug as "CLOSED CANTFIX", concluding that "this is a hardware processor issue, not a Linux kernel flaw" and that "it is specific to a target software which uses sensitive information in branching expressions." The mitigation responsibility falls on individual software to avoid using sensitive data in conditional branches, which is out of the scope of this tool.
|
**Why out of scope:** No kernel or microcode mitigations have been issued. Red Hat closed their tracking bug as "CLOSED CANTFIX", concluding that "this is a hardware processor issue, not a Linux kernel flaw" and that "it is specific to a target software which uses sensitive information in branching expressions." The mitigation responsibility falls on individual software to avoid using sensitive data in conditional branches, which is out of the scope of this tool.
|
||||||
|
|
||||||
|
## CVE-2018-15572 — SpectreRSB (Return Stack Buffer)
|
||||||
|
|
||||||
|
- **Issue:** [#224](https://github.com/speed47/spectre-meltdown-checker/issues/224)
|
||||||
|
- **Research paper:** [Spectre Returns! Speculation Attacks using the Return Stack Buffer (WOOT'18)](https://arxiv.org/abs/1807.07940)
|
||||||
|
- **Kernel fix:** [commit fdf82a7856b3](https://github.com/torvalds/linux/commit/fdf82a7856b32d905c39afc85e34364491e46346) (Linux 4.18.1)
|
||||||
|
- **CVSS:** 6.5 (Medium)
|
||||||
|
|
||||||
|
The `spectre_v2_select_mitigation` function in the Linux kernel before 4.18.1 did not always fill the RSB upon a context switch, allowing userspace-to-userspace SpectreRSB attacks on Skylake+ CPUs where an empty RSB falls back to
|
||||||
|
he BTB.
|
||||||
|
|
||||||
|
**Why out of scope:** This CVE is a Spectre V2 mitigation gap (missing RSB filling on context switch), not a distinct hardware vulnerability. It is already fully covered by this tool's CVE-2017-5715 (Spectre V2) checks, which dete
|
||||||
|
ct whether the kernel performs RSB filling on CPUs vulnerable to RSB underflow (Skylake+ and RSBA-capable CPUs). A missing RSB fill is flagged as a caveat ("RSB filling missing on Skylake+") in the Spectre V2 verdict.
|
||||||
|
|
||||||
## CVE-2024-36348 — AMD Transient Scheduler Attack (UMIP bypass)
|
## CVE-2024-36348 — AMD Transient Scheduler Attack (UMIP bypass)
|
||||||
|
|
||||||
**Bulletin:** [AMD-SB-7029](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html)
|
- **Bulletin:** [AMD-SB-7029](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html)
|
||||||
**CVSS:** 3.8 (Low)
|
- **CVSS:** 3.8 (Low)
|
||||||
|
|
||||||
A transient execution vulnerability in some AMD processors may allow a user process to speculatively infer CPU configuration registers even when UMIP is enabled.
|
A transient execution vulnerability in some AMD processors may allow a user process to speculatively infer CPU configuration registers even when UMIP is enabled.
|
||||||
|
|
||||||
@@ -24,8 +37,8 @@ A transient execution vulnerability in some AMD processors may allow a user proc
|
|||||||
|
|
||||||
## CVE-2024-36349 — AMD Transient Scheduler Attack (TSC_AUX leak)
|
## CVE-2024-36349 — AMD Transient Scheduler Attack (TSC_AUX leak)
|
||||||
|
|
||||||
**Bulletin:** [AMD-SB-7029](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html)
|
- **Bulletin:** [AMD-SB-7029](https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7029.html)
|
||||||
**CVSS:** 3.8 (Low)
|
- **CVSS:** 3.8 (Low)
|
||||||
|
|
||||||
A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled.
|
A transient execution vulnerability in some AMD processors may allow a user process to infer TSC_AUX even when such a read is disabled.
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user