summaryrefslogtreecommitdiffstats
path: root/active/CVE-2020-10766
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2020-06-10 15:09:32 +0200
committerMoritz Muehlenhoff <jmm@debian.org>2020-06-10 15:09:32 +0200
commitff37caffbe9266e1fc178d72b35fc741a021e217 (patch)
treecf69f4e74577179925b8a7bdc93ab478d382c316 /active/CVE-2020-10766
parentf7168201de54cbd3ed936908eb49068052dedbbe (diff)
new SSBD related issues
Diffstat (limited to 'active/CVE-2020-10766')
-rw-r--r--active/CVE-2020-1076614
1 files changed, 14 insertions, 0 deletions
diff --git a/active/CVE-2020-10766 b/active/CVE-2020-10766
new file mode 100644
index 00000000..6964ef51
--- /dev/null
+++ b/active/CVE-2020-10766
@@ -0,0 +1,14 @@
+Description: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
+References:
+ https://lkml.org/lkml/2020/6/9/181
+ https://www.openwall.com/lists/oss-security/2020/06/10/1
+Notes:
+Bugs:
+upstream:
+4.19-upstream-stable:
+4.9-upstream-stable:
+3.16-upstream-stable:
+sid:
+4.19-buster-security:
+4.9-stretch-security:
+3.16-jessie-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy