Wind River Support Network

HomeSafety and Security NoticesWind River Security Vulnerability Notice: CVE-2022-0001 Spectre-BHI and CVE-2022-0002 Spectre-IMBTI vulnerability on Intel CPU
Recommended

Wind River Security Vulnerability Notice: CVE-2022-0001 Spectre-BHI and CVE-2022-0002 Spectre-IMBTI vulnerability on Intel CPU

Released: Mar 9, 2022     Updated: Mar 13, 2022

Summary

Researchers disclosed two new cache speculation vulnerability known as Branch History Injection (BHI) and Intra-mode BTI (IMBTI). A serials of Intel cpus are affected on it.


Affected Product Versions

Wind River Linux LTS 18, Wind River Linux LTS 17, Wind River Linux 9, Wind River Linux 5, Wind River Linux 6, Wind River Linux 7, Wind River Linux 8, Wind River Linux LTS 21, Wind River Linux CD, Wind River Linux LTS 19

Description

CVE-2022-0001(Medium): Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.


CVE-2022-0002(Medium): Non-transparent sharing of branch predictor within a context in some Intel® Processors may allow an authorized user to potentially enable information disclosure via local access.


What software is known to be affected by these CVEs?

This is a security issue in CPU, mitigated by linux kernel(and microcode) update.


Is Wind River Linux affected by these CVE issues?

YES. This is a issue of CPU, if your CPU is affected, yes, the Windriver Linux system running on it is affected.


Affected software components:

This is a hardware(CPU) issue.


Affected hardware:

A searials of Intel cpus, Details in affected processors.

Note: The table of affected processors (2022 tab) linked above indicates the processors for which privileged code may be affected by BHI (CVE-2022-0001) and/or intra-mode BTI (CVE-2022-0002) when the IBRS/eIBRS mitigations against BTI are properly applied.


Mitigation

Different CPU need different mitigation method. All affected CPUs need kernel patch, seldom of them also need to upgrade microcode. For details please also see the affected processors table above.

With newest microcode and linux kernel, you need to disable unprivileged eBPF in runtime:

 $ sudo sysctl kernel.unprivileged_bpf_disabled=1


Additional References

https://www.csoonline.com/article/3652525/new-attack-bypasses-hardware-defenses-for-spectre-flaw-in-intel-and-arm-cpus.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html

https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/technical-documentation/branch-history-injection.html

https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00598.html

http://download.vusec.net/papers/bhi-spectre-bhb_sec22.pdf

We will port all necessary patches on all our supporting releases. We will continue to update this web page and once we have any progress you can get it here.

For any questions or requirements, please contact your local WR support team, or mail to security-alert@windriver.com directly.


Changelog

  • 02/09/2022: Initial


Live chat
Online