blob: 36176817a6f39ae02ac4ce6c7d9a2430719311d0 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
|
Description: Rogue cross-process SSBD shutdown. Linux scheduler logical bug allows an attacker to turn off the SSBD protection.
References:
https://lkml.org/lkml/2020/6/9/181
https://www.openwall.com/lists/oss-security/2020/06/10/1
https://bugzilla.redhat.com/show_bug.cgi?id=1845840
Notes:
carnil> Commit fixes 5bfbe3ad5840 ("x86/speculation: Prepare for per
carnil> task indirect branch speculation control")
Bugs:
upstream: pending [dbbe2ad02e9df26e372f38cc3e70dab9222c832e]
4.19-upstream-stable: needed
4.9-upstream-stable: needed
3.16-upstream-stable: needed
sid: needed
4.19-buster-security: needed
4.9-stretch-security: needed
3.16-jessie-security: needed
|