Description: Speculative Return Stack Overflow (SRSO) References: https://comsec.ethz.ch/research/microarch/inception/ https://comsec.ethz.ch/wp-content/files/inception_sec23.pdf https://github.com/comsec-group/inception https://www.openwall.com/lists/oss-security/2023/08/08/4 https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-7005 https://www.amd.com/content/dam/amd/en/documents/corporate/cr/speculative-return-stack-overflow-whitepaper.pdf Notes: Bugs: upstream: released (6.5-rc6) [0e52740ffd10c6c316837c6c128f460f1aaba1ea, fb3bd914b3ec28f5fb697ac55c4846ac2d542855, 79113e4060aba744787a81edb9014f2865193854, 1b5277c0ea0b247393a9c426769fde18cff5e2f6, 233d6f68b98d480a7c42ebe78c38f79d44741ca9, d893832d0e1ef41c72cdae444268c1d64a2be8ad, 238ec850b95a02dcdff3edc86781aa913549282f, 3bbbe97ad83db8d9df06daf027b0840188de625d, 5a15d8348881e9371afdf9f5357a135489496955] 6.1-upstream-stable: released (6.1.44) [dfede4cb8ef732039b7a479d260bd89d3b474f14, dec3b91f2c4b2c9b24d933e2c3f17493e30149ac, ac41e90d8daa8815d8bee774a1975435fbfe1ae7, 9139f4b6dd4fe1003ba79ab317d1a9f48849b369, 98f62883e7519011bf63f85381d637f65d7f180e, 79c8091888ef61aac79ef72122d1e6cd0b620669, c9ae63d773ca182c4ef63fbdd22cdf090d9c1cd7, c7f2cd04554259c2474c4f9fa134528bc2826b22, 77cf32d0dbfbf575fe66561e069228c532dc1da9, 4f25355540ad4d40dd3445f66159a321dad29cc8] 5.10-upstream-stable: released (5.10.189) [baf6d6c39e2390ef91bec12d057294dd507d1115, 437fa179f2136d349fda78331fd28696e40def9d, 9b7fe7c6fbc007564f97805ff45882e79f0c70d0, 073a28a9b50662991e7d6956c2cf2fc5d54f28cd, 34f23ba8a399ecd38b45c84da257b91d278e88aa, 3f9b7101bea1dcb63410c016ceb266f6e9f733c9, df76a59feba549825f426cb1586bfa86b49c08fa, e47af0c255aed7da91202f26250558a8e34e1c26, 4acaea47e3bcb7cd55cc56c7fd4e5fb60eebdada, 384d41bea948a18288aff668b7bdf3b522b7bf73, 4873939c0e1cec2fd04a38ddf2c03a05e4eeb7ef, 8457fb5740b14311a8941044ff4eb5a3945de9b2] 4.19-upstream-stable: ignored "Mitigation is too invasive to backport" sid: released (6.4.4-3) [bugfix/x86/srso/x86-bugs-increase-the-x86-bugs-vector-size-to-two-u32s.patch, bugfix/x86/srso/x86-srso-add-a-speculative-ras-overflow-mitigation.patch, bugfix/x86/srso/x86-srso-add-ibpb_brtype-support.patch, bugfix/x86/srso/x86-srso-add-srso_no-support.patch, bugfix/x86/srso/x86-srso-add-ibpb.patch, bugfix/x86/srso/x86-srso-add-ibpb-on-vmexit.patch, bugfix/x86/srso/x86-srso-fix-return-thunks-in-generated-code.patch, bugfix/x86/srso/x86-srso-add-a-forgotten-noendbr-annotation.patch, bugfix/x86/srso/x86-srso-tie-sbpb-bit-setting-to-microcode-patch-detection.patch] 6.1-bookworm-security: released (6.1.38-3) [bugfix/x86/srso/x86-bugs-increase-the-x86-bugs-vector-size-to-two-u32s.patch, bugfix/x86/srso/x86-cpu-kvm-add-support-for-cpuid_80000021_eax.patch, bugfix/x86/srso/x86-srso-add-a-speculative-ras-overflow-mitigation.patch, bugfix/x86/srso/x86-srso-add-ibpb_brtype-support.patch, bugfix/x86/srso/x86-srso-add-srso_no-support.patch, bugfix/x86/srso/x86-srso-add-ibpb.patch, bugfix/x86/srso/x86-srso-add-ibpb-on-vmexit.patch, bugfix/x86/srso/x86-srso-fix-return-thunks-in-generated-code.patch, bugfix/x86/srso/x86-srso-add-a-forgotten-noendbr-annotation.patch, bugfix/x86/srso/x86-srso-tie-sbpb-bit-setting-to-microcode-patch-detection.patch] 5.10-bullseye-security: released (5.10.179-4) [bugfix/x86/srso/x86-cpu-add-vm-page-flush-msr-availablility-as-a-cpuid-feature.patch, bugfix/x86/srso/x86-cpufeatures-assign-dedicated-feature-word-for-cpuid_0x8000001f.patch, bugfix/x86/srso/tools-headers-cpufeatures-sync-with-the-kernel-sources.patch, bugfix/x86/srso/x86-bugs-increase-the-x86-bugs-vector-size-to-two-u32s.patch, bugfix/x86/srso/x86-cpu-kvm-add-support-for-cpuid_80000021_eax.patch, bugfix/x86/srso/x86-srso-add-a-speculative-ras-overflow-mitigation.patch, bugfix/x86/srso/x86-srso-add-ibpb_brtype-support.patch, bugfix/x86/srso/x86-srso-add-srso_no-support.patch, bugfix/x86/srso/x86-srso-add-ibpb.patch, bugfix/x86/srso/x86-srso-add-ibpb-on-vmexit.patch, bugfix/x86/srso/x86-srso-fix-return-thunks-in-generated-code.patch, bugfix/x86/srso/x86-srso-tie-sbpb-bit-setting-to-microcode-patch-detection.patch] 4.19-buster-security: ignored "Mitigation is too invasive to backport"