diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2020-06-10 15:09:32 +0200 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2020-06-10 15:09:32 +0200 |
commit | ff37caffbe9266e1fc178d72b35fc741a021e217 (patch) | |
tree | cf69f4e74577179925b8a7bdc93ab478d382c316 /active/CVE-2020-10766 | |
parent | f7168201de54cbd3ed936908eb49068052dedbbe (diff) |
new SSBD related issues
Diffstat (limited to 'active/CVE-2020-10766')
-rw-r--r-- | active/CVE-2020-10766 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/active/CVE-2020-10766 b/active/CVE-2020-10766 new file mode 100644 index 00000000..6964ef51 --- /dev/null +++ b/active/CVE-2020-10766 @@ -0,0 +1,14 @@ +Description: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection. +References: + https://lkml.org/lkml/2020/6/9/181 + https://www.openwall.com/lists/oss-security/2020/06/10/1 +Notes: +Bugs: +upstream: +4.19-upstream-stable: +4.9-upstream-stable: +3.16-upstream-stable: +sid: +4.19-buster-security: +4.9-stretch-security: +3.16-jessie-security: |